Exploit topic

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

List Exploit repositories

pwnKit

6
Stars
3
Forks
Watchers

pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.

kernel-exploits

696
Stars
243
Forks
Watchers

Various kernel exploits

local-exploits

132
Stars
57
Forks
Watchers

Various local exploits

serenity-exploits

15
Stars
2
Forks
Watchers

Various exploits for SerenityOS

pt-jsfp

16
Stars
7
Forks
Watchers

Explanation of All the Payloads Used in Pentester Academy's JS for Pentester Course

awesome-hacker-search-engines

6.8k
Stars
637
Forks
Watchers

A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more

dirtycow

821
Stars
428
Forks
Watchers

Dirty Cow exploit - CVE-2016-5195

Drupalgeddon2

564
Stars
178
Forks
Watchers

Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)

cve-2019-11447

5
Stars
3
Forks
Watchers

CutePHP Cute News 2.1.2 RCE PoC

cve-2020-9375

16
Stars
7
Forks
Watchers

TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.