Exploit topic

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

List Exploit repositories

doona

67
Stars
22
Forks
Watchers

Network based protocol fuzzer

htshells

994
Stars
191
Forks
Watchers

Self contained htaccess shells and attacks

herpaderping

1.1k
Stars
212
Forks
Watchers

Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.

windows_kernel_resources

345
Stars
101
Forks
Watchers

Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits

ADMMutate

80
Stars
18
Forks
Watchers

Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this...

LanguageBackdoors

49
Stars
12
Forks
Watchers

Compiler exploits and exploitable non-obvious source code back doors.

Scripting

53
Stars
6
Forks
Watchers

PS / Bash / Python / Other scripts For FUN!

gdb-static

300
Stars
69
Forks
Watchers

Public repository of statically compiled GDB and GDBServer

gef

6.6k
Stars
710
Forks
Watchers

GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux

gef-extras

143
Stars
49
Forks
Watchers

Extra goodies for GEF to (try to) make GDB suck even less