Exploit topic

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

List Exploit repositories

SubRosa

53
Stars
20
Forks
Watchers

Basic tool to automate backdooring PE files

go-gtfo

60
Stars
10
Forks
Watchers

gtfo, now with the speed of golang

gtfo

453
Stars
83
Forks
Watchers

Search gtfobins and lolbas files from your terminal

shu-shell

25
Stars
15
Forks
Watchers

Webshell Jumping Edition

AutoXploit

69
Stars
22
Forks
Watchers

Fast exploitation based on metasploit.

macOS-Kernel-Exploit

292
Stars
43
Forks
Watchers

macOS Kernel Exploit for CVE-2019-8781.

unauthd

83
Stars
12
Forks
Watchers

A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854

CVEScannerV2

75
Stars
12
Forks
Watchers

Nmap script that scans for probable vulnerabilities based on services discovered in open ports.

Axon

74
Stars
63
Forks
Watchers

Unrestricted Lua Execution

IceMeme

60
Stars
49
Forks
Watchers

Roblox Exploit Source Code Called IceMeme with some cmds, lua c and limited lua execution with simple ui in c#