Exploit topic

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

List Exploit repositories

linuxallenum

21
Stars
1
Forks
Watchers

this bash script is for remote linux and macos hosts hacked!

linuxallremote

42
Stars
8
Forks
Watchers

This bash scripts will help you to hack remote hosts. You can choose and run one of them.

vulncontrol

25
Stars
9
Forks
Watchers

Python script for monitoring vulnerabilities database

kernel-exploits

1.4k
Stars
368
Forks
Watchers

My proof-of-concept exploits for the Linux kernel

linux-kernel-exploitation

5.4k
Stars
955
Forks
Watchers

A collection of links related to Linux kernel security and exploitation

unlockdown

76
Stars
6
Forks
Watchers

Disabling kernel lockdown on Ubuntu without physical access

log4j2-rce-exploit

68
Stars
26
Forks
Watchers

log4j2 remote code execution or IP leakage exploit (with examples)

CVE-2020-15368

407
Stars
45
Forks
Watchers

CVE-2020-15368, aka "How to exploit a vulnerable driver"

ysoserial

7.4k
Stars
1.7k
Forks
Watchers

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

K8tools

5.7k
Stars
2.1k
Forks
Watchers

K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogi...