Exploit topic

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

List Exploit repositories

amlogic-usbdl

68
Stars
23
Forks
Watchers

Unsigned code loader for Amlogic BootROM

exynos-usbdl

80
Stars
23
Forks
Watchers

Unsigned code loader for Exynos BootROM

BoomER

85
Stars
24
Forks
Watchers

Framework for exploiting local vulnerabilities

ansvif

103
Stars
28
Forks
Watchers

A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.

PoC-Bank

88
Stars
27
Forks
Watchers

Focus on cybersecurity | collection of PoC and Exploits

bscValueDefi-Exploit

23
Stars
8
Forks
Watchers

Abusing delayed share calculations on 4000% APR staking.

CTF-All-In-One

3.8k
Stars
688
Forks
Watchers

CTF竞赛权威指南

AutoSploit

4.9k
Stars
1.1k
Forks
Watchers

Automated Mass Exploiter

MIDA-Multitool

160
Stars
78
Forks
Watchers

Bash script purposed for system enumeration, vulnerability identification and privilege escalation.

exploit

179
Stars
49
Forks
Watchers

Collection of different exploits