Projects in Awesome Lists tagged with exploiting
A curated list of projects in awesome lists tagged with exploiting .
https://github.com/epsylon/xsser
Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
exploiting pentesting toolkit xss xsser
Last synced: 15 May 2025
https://github.com/mesquidar/adbsploit
A python based tool for exploiting and managing Android devices via ADB
adb android android-exploitation android-hacking apk exploit exploiting hacking
Last synced: 13 Apr 2025
https://github.com/therealdreg/shellex
C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & 010 editor
010editor exploiting gdb hex-converter immunitydebugger linux ollydbg shellcode shellcode-convert shellex windbg windows
Last synced: 17 Mar 2025
https://github.com/therealdreg/x64dbg-exploiting
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
buffer-overflow buffer-overflow-attack buffer-overflow-poc corelan ecpptv2 ecpptv2-study exploit-exercises exploiting exploiting-windows mona oscp oscp-cheatsheet oscp-notes oscp-prep python x64dbg x64dbg-plugin
Last synced: 17 Mar 2025
https://github.com/anish-agnihotri/blog-effective-nft-launches-data
Data+code for NFT launch guide blogpost.
data exploiting fairness launches nft
Last synced: 14 Apr 2025
https://github.com/agustingianni/utilities
Uncategorized utilities
arm exploiting ida idapython prolog research scripts vulndev
Last synced: 10 May 2025
https://github.com/ForceFledgling/CVE-2023-22518
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
atlassian atlassian-confluence attack backdoor confluence critical cve exploit exploiting hacking hacking-tool improper python shell vulnerabilities vulnerability
Last synced: 30 Apr 2025
https://github.com/therealdreg/xshellex
With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger
exploiting immunitydebugger ollydbg shellcode-development shellex x64dbg x64dbg-plugin xshellex
Last synced: 21 Mar 2025
https://github.com/txuswashere/pentesting
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
active-directory audit auditing bugbounty cloudsecurity cyber-security cybersecurity exploiting hacking networksecurity osint pentesting pentesting-tools privilegeescalation purple-team purpleteam resources reversing webpentest webpentesting
Last synced: 18 Feb 2026
https://github.com/rft0/km-dll-mapper
Kernel Mode DLL Manual Mapper
c cpp dll-injector dll-manual-mapper exploiting injector manualmap manualmapper ntoskrnl winapi windows windows-kernel
Last synced: 11 Apr 2025
https://github.com/demining/blockchain-attack-vectors
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
attack attacker attacks bitcoin blockchain blockchain-technology cryptocurrency ethereum exploit exploiting exploiting-vulnerabilities hack hacking smart-contracts vulnerabilities vulnerability vulnerability-scanners
Last synced: 25 Jun 2025
https://github.com/therealdreg/hcon2026hwctf
Hardware Hacking CTF hcon2026hwctf - RISCV Hazard3 (@Wren6991) Exploiting by @b1n4ri0 @antoniovazquezblanco & @therealdreg
ctf exploiting h-c0n hardware-hacking hardwarehacking hazard3 hcon2026 pico2 raspberry-pi-pico-2 riscv rp2350
Last synced: 04 Mar 2026
https://github.com/demining/twist-attack
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
attack attacker bitcoin bitcoin-wallet blockchain blockchain-technology cryptocurrency exploit exploiting exploiting-vulnerabilities hack hacking vulnerabilities vulnerability vulnerability-scanners
Last synced: 09 Aug 2025
https://github.com/demining/twist-attack-2
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
attack attacker bitcoin bitcoin-wallet blockchain blockchain-technology cryptocurrency exploit exploiting exploiting-vulnerabilities hack hacking vulnerabilities vulnerability vulnerability-scanners
Last synced: 24 Jun 2025
https://github.com/franckferman/systematic
👻 SYSTEMatic: Systematically Seizing SYSTEM Rights. Token Impersonation POC. Alternative to PSExec for token theft. From Administrator to NT Authority\SYSTEM.
administration-system administrator c cyber-security cybersecurity elevation-of-privilege exploiting poc privilege-elevation privilege-escalation proof-of-concept proof-of-work psexec security security-tools system-administration token-stealer windows windows-10 windows-server
Last synced: 27 Dec 2025
https://github.com/trimscash/texthex
Read text section bytes and format it for shellcode (64bit ELF only)
cli elf elf-parser exploiting hex-converter readelf shellcode shellcode-convert tool
Last synced: 25 Apr 2025
https://github.com/uyrib8/nebula-executor
Nebula is a new Lua executor for Roblox. It's simple, straightforward, we ensure quick patches after Roblox updates.
bloxfruits-script cheat exploiting roblox roblox-lua roblox-script roblox-scripts roblox-studio robloxdev rojo
Last synced: 19 Jan 2026
https://github.com/trimscash/elfmt
Read text section bytes and format it for shellcode. based on trimscash/texthex
cli elf elf-parser exploiting hex-converter readelf shellcode shellcode-convert tool
Last synced: 27 Mar 2025
https://github.com/mbn-code/win7-kali-pentesting
Setting up Kali Linux and Windows 7 for Penetration Testing in VirtualBox
cyber cybersecurity education exploiting guide guides hackingtools kali learning linux network nmap pentest troubleshooting virtual-machine virtualbox vulnerabilities win7 windows
Last synced: 16 Jun 2025
https://github.com/chewgetto87/jjsploit-roblox-new
JJSploit, now available for free, is a widely-used Roblox exploit favored for its simplicity and accessibility. With the ability to execute Lua scripts, it enables users to customize their gaming experience, though users should remain vigilant about potential risks associated with exploiting software.
app delta-exploit delta-exploits exploiting github-config jjsploit-custom-scripts jjsploit-game-modifier jjsploit-mod-scripts jjsploit-script-library jjsploit-script-runner lua luau roblox roblox-menu
Last synced: 03 Mar 2025
https://github.com/jroimartin/explib
Python package for CTFs and exploit development
Last synced: 06 Mar 2025
https://github.com/lemoon35redzilla/jjsploit-roblox
JJSploit, now available for free, is a widely-used Roblox exploit favored for its simplicity and accessibility. With the ability to execute Lua scripts, it enables users to customize their gaming experience, though users should remain vigilant about potential risks associated with exploiting software.
app delta-exploit delta-exploits exploiting github-config jjsploit-custom-scripts jjsploit-game-modifier jjsploit-mod-scripts jjsploit-script-library jjsploit-script-runner lua luau roblox roblox-menu
Last synced: 03 Mar 2025
https://github.com/sandstorm191/jjsploit
JJSploit, now available for free, is a widely-used Roblox exploit favored for its simplicity and accessibility. With the ability to execute Lua scripts, it enables users to customize their gaming experience, though users should remain vigilant about potential risks associated with exploiting software.
crack exploiting free jjsploit jjsploit-code-injector jjsploit-custom-scripts jjsploit-exploit-pack jjsploit-game-modifier jjsploit-mod-scripts jjsploit-roblox-boost jjsploit-roblox-bypass jjsploit-roblox-enhance jjsploit-roblox-enhancer roblox
Last synced: 18 Jan 2026
https://github.com/hoaibao2008/jjsploit
JJSploit, now available for free, is a widely-used Roblox exploit favored for its simplicity and accessibility. With the ability to execute Lua scripts, it enables users to customize their gaming experience, though users should remain vigilant about potential risks associated with exploiting software.
app delta-exploit delta-exploits exploiting github-config jjsploit-custom-scripts jjsploit-game-modifier jjsploit-mod-scripts jjsploit-script-library jjsploit-script-runner lua luau roblox roblox-menu
Last synced: 17 Jun 2025
https://github.com/dmzhari/suppboard-exploit-3.5.6
Support board Exploit add user with CSRF
exploit exploit-code exploit-development exploitation exploiting web-exp web-exploits
Last synced: 07 Jan 2026
https://github.com/youssef14a/jjsploit
JJSploit, now available for free, is a widely-used Roblox exploit favored for its simplicity and accessibility. With the ability to execute Lua scripts, it enables users to customize their gaming experience, though users should remain vigilant about potential risks associated with exploiting software.
app chasrp exploiting jjsploit jjsploit-game-modifier jjsploit-roblox-bypass jjsploit-roblox-enhance jjsploit-roblox-security jjsploit-script-runner lua roblox roblox-jjsploit roblox-script velocity
Last synced: 12 Jun 2025