32 results for “topic:exploit-kit”
collection of verified Linux kernel exploits
Extension for GDB
AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.
PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible
Exploits for iOS 11.4.1-iOS 17.4.1 and android 8.0-15
React2Shell Auto Exploit: A CLI tool to exploit prototype pollution vulnerabilities (RCE) in React Server Actions
No description provided.
Anyform is a lightweight form brute-forcing tool.
Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad character identifier, shellcode carver, and a vanilla EIP exploiter
dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.
A minimal Linux kernel development & exploitation lab.
A toolkit designed for studying how misconfigurations or insecure patterns in Next.js applications can lead to severe vulnerabilities such as Remote Code Execution (RCE).
Exploit toolkit for old ip cameras. Inspired by Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
Deobfuscated DemonHunter Exploit Kit.
Objdump to ShellCode
remote exploits, just run, with dorks, and everything
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Hello friend. This is the Fsociety Exploit Framework for CVE-2025-24071. Generates malicious .library-ms files to steal NTLMv2 hashes. Includes a 'Living Terminal' Cinematic Mode, Deep Trace logging, and stealth evasion techniques. Join the revolution. #Hacking #Exploit #CVE-2025-24071
Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
This is a set of hacking tools written in NodeJS
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
For Student Kaiyu Sun
Scanner Remote Code Execution yang rentan di web berbasis PHP seperti Laravel, ThinkPHP, FCKeditor, dll. Dibuat dengan Python, cocok untuk pentest & bug bounty.
Some RMI/LDAP servers for exploiting JNDI injections
Linux 2.6.39 Sürümüne Göre Uygun Olan Bir Exploit
Advanced PDF exploit builder