75 results for “topic:exploiting”
Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
A python based tool for exploiting and managing Android devices via ADB
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
WindUI is a open source UI library for Roblox Script Hubs
Exploiting challenges in Linux and Windows
C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & 010 editor
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
Framework for exploiting local vulnerabilities
Data+code for NFT launch guide blogpost.
Challenges and vulnerabilities exploitation.
Improper Authorization Vulnerability in Confluence Data Center and Server
Uncategorized utilities
Kernel Mode DLL Manual Mapper
The best backdoor scanner there is.
With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger
✨Universal Aim Assist Framework✨
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
Hacking training websites list and tutorials
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
Hardware Hacking CTF hcon2026hwctf - RISCV Hazard3 (@Wren6991) Exploiting by @b1n4ri0 @antoniovazquezblanco & @therealdreg
Open Aimbot is a universal open source framework. It offers a wide selection of extensive functionality. We develop various utilities for Roblox, security systems, protection and scripts for specific games, and general scenarios.
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
poxyran's blog
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
JJSploit, now available for free, is a widely-used Roblox exploit favored for its simplicity and accessibility. With the ability to execute Lua scripts, it enables users to customize their gaming experience, though users should remain vigilant about potential risks associated with exploiting software.
Premium Roblox Script Hub
A dynamic UI Library for ROBLOX Experiences. Made in the style of the original Turtle Spy!
We're back better than ever with constant almost everyday updating and exploring new experiences to make communities for! Enjoy Flames Hub today!
Open Aimbot is a universal open source framework. It offers a wide selection of extensive functionality. We develop various utilities for Roblox, security systems, protection and scripts for specific games, and general scenarios.
Insecure Java Deserialization Lab