Exploit topic

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

List Exploit repositories

Android-Exploits

720
Stars
137
Forks
Watchers

A collection of android Exploits and Hacks

angularjs-csti-scanner

290
Stars
86
Forks
Watchers

Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.

kernel-mii

80
Stars
27
Forks
Watchers

Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.

CVE-2018-4407

33
Stars
9
Forks
Watchers

IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]

MycroftAI-RCE

51
Stars
23
Forks
Watchers

"Zero Click" Remote Code Execution in Mycroft AI vocal assistant

labs

1.1k
Stars
442
Forks
Watchers

Vulnerability Labs for security analysis

AirDoS

213
Stars
44
Forks
Watchers

💣 Remotely render any nearby iPhone or iPad unusable with an AirDrop exploit (now patched)

autorop

45
Stars
8
Forks
Watchers

Automated solver of classic CTF pwn challenges, with flexibility in mind.

CVE-2019-7192_QNAP_Exploit

82
Stars
33
Forks
Watchers

QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)

SpoolSploit

546
Stars
93
Forks
Watchers

A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.