The code repository for the Snake&Apple article series.
-
Updated
Jun 10, 2024 - Python
The code repository for the Snake&Apple article series.
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Hourly updated database of exploit and exploitation reports
Automatic SSRF fuzzer and exploitation tool
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Automatic SQL injection and database takeover tool
Cybersecurity oriented awesome list
Automated All-in-One OS Command Injection Exploitation Tool.
An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
UNIX-like reverse engineering framework and command-line toolset.
In this project, I analyzed the prosper load data, studied the trends and concluded that monthly income, loan amount and borrower's rate significantly affect the prosper rating and a good predictors of delinquency.
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is accessible to as large an audience as possible and so that everyone has a good resource to learn hacking from.
A Simple Tool to gather information from any website, domain, sub-domain, DNS, links by enumeration with simple commands.
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."