Exploit topic
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Android-Exploits
A collection of android Exploits and Hacks
angularjs-csti-scanner
Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.
kernel-mii
Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.
CVE-2018-4407
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
MycroftAI-RCE
"Zero Click" Remote Code Execution in Mycroft AI vocal assistant
labs
Vulnerability Labs for security analysis
AirDoS
💣 Remotely render any nearby iPhone or iPad unusable with an AirDrop exploit (now patched)
autorop
Automated solver of classic CTF pwn challenges, with flexibility in mind.
CVE-2019-7192_QNAP_Exploit
QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)
SpoolSploit
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.