Exploit
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Here are 2,270 public repositories matching this topic...
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
-
Updated
Jun 10, 2024 - C#
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
-
Updated
Jun 10, 2024 - C++
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
-
Updated
Jun 10, 2024 - C#
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
-
Updated
Jun 10, 2024 - C#
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
Jun 10, 2024 - C++
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
-
Updated
Jun 10, 2024 - C++
Hourly updated database of exploit and exploitation reports
-
Updated
Jun 10, 2024 - Python
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
-
Updated
Jun 10, 2024
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
-
Updated
Jun 10, 2024 - Python
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现
-
Updated
Jun 10, 2024 - Python
📡 PoC auto collect from GitHub.
-
Updated
Jun 10, 2024
A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)
-
Updated
Jun 10, 2024 - Python
Gather and update all available and newest CVEs with their PoC.
-
Updated
Jun 10, 2024 - HTML
This repo contains IOC, malware and malware analysis associated with Public cloud
-
Updated
Jun 10, 2024
The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Subdomain Center & Exploit Observer.
-
Updated
Jun 10, 2024 - Python
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
-
Updated
Jun 10, 2024 - AutoIt
Created by The cybersecurity community
- Followers
- 269 followers
- Wikipedia
- Wikipedia