exploits
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Here are 14 public repositories matching this topic...
Repository for information about 0-days exploited in-the-wild.
-
Updated
May 16, 2024 - HTML
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
-
Updated
Jun 12, 2023 - HTML
A Web Vulnerability Scanner and Patcher
-
Updated
Jul 4, 2024 - HTML
PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282
-
Updated
May 27, 2024 - HTML
Some Generic Browser Exploits (For Educational Purposes Only)
-
Updated
Jan 12, 2022 - HTML
Exploits for some of the vulnerabilities I have discovered
-
Updated
Aug 3, 2020 - HTML
A program that stops the lanschool and lanschool air program from starting
-
Updated
Mar 29, 2024 - HTML
Just H4 and L0 publishing write ups of hacking CTFs and challenges
-
Updated
Nov 10, 2023 - HTML
A personal website containting usage syntax for various popular tools and information related to ethical hacking and pentesting.
-
Updated
Sep 18, 2023 - HTML
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
-
Updated
Mar 4, 2019 - HTML
-
Updated
Apr 5, 2017 - HTML
The source code and files for my personal website.
-
Updated
Jul 7, 2024 - HTML
Created by The cybersecurity community
- Followers
- 271 followers
- Wikipedia
- Wikipedia