Exploit topic
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
SubRosa
Basic tool to automate backdooring PE files
go-gtfo
gtfo, now with the speed of golang
gtfo
Search gtfobins and lolbas files from your terminal
AutoXploit
Fast exploitation based on metasploit.
macOS-Kernel-Exploit
macOS Kernel Exploit for CVE-2019-8781.
unauthd
A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
CVEScannerV2
Nmap script that scans for probable vulnerabilities based on services discovered in open ports.