Exploit topic

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

List Exploit repositories

memrepl

46
Stars
6
Forks
Watchers

Memory inspection REPL interface

TegraRcmGUI

1.9k
Stars
144
Forks
Watchers

C++ GUI for TegraRcmSmash (Fusée Gelée exploit for Nintendo Switch)

heapinspect

220
Stars
19
Forks
Watchers

🔍Heap analysis tool for CTF pwn.

Malware

37
Stars
14
Forks
Watchers

😈 CAUTION - Malicious files 💀

jenkins-rce

295
Stars
66
Forks
Watchers

:smiling_imp: Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!

butthax

214
Stars
12
Forks
Watchers

lovense hush buttplug exploit chain

CVE-2019-11708

616
Stars
80
Forks
Watchers

Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.

CVE-2019-9810

227
Stars
58
Forks
Watchers

Exploit for CVE-2019-9810 Firefox on Windows 64-bit.

OSCP

917
Stars
472
Forks
Watchers

Collection of things made during my OSCP journey