Projects in Awesome Lists tagged with exploiting-vulnerabilities
A curated list of projects in awesome lists tagged with exploiting-vulnerabilities .
https://github.com/joaomatosf/jexboss
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
deserialization exploit exploiting-vulnerabilities gadget javadeser reverse-shell
Last synced: 15 May 2025
https://github.com/c0ny1/fastjsonexploit
Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)
exp exploiting-vulnerabilities fastjson poc
Last synced: 16 May 2025
https://github.com/c0ny1/FastjsonExploit
Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)
exp exploiting-vulnerabilities fastjson poc
Last synced: 13 Mar 2025
https://github.com/koutto/jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
automation automation-framework docker exploiting-vulnerabilities framework hacking hacking-tool network pentest scan-tool scanner security security-audit security-tools toolbox toolbox-management vulnerability-scanners web-hacking
Last synced: 16 May 2025
https://github.com/psc4re/quick-scripts
A collection of my quick and dirty scripts for vulnerability POC and detections
exploit-code exploiting-vulnerabilities information-security python scanner security vulnerability vulnerability-detection vulnerability-management
Last synced: 13 May 2025
https://github.com/mufeedvh/cve-2019-8449
CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
cve cve-2019-8449 cve-exploit exploit exploit-code exploit-database exploitdb exploiting-vulnerabilities exploits jira jira-api jira-issue jira-rest-api vulnerability
Last synced: 30 Apr 2025
https://github.com/radenvodka/pentol
PENTOL - Pentester Toolkit for Fiddler2
bugbounty exploit exploiting-vulnerabilities fiddler-extension fiddler2 kitploit pentest-tool pentesting security security-tools tools
Last synced: 11 May 2025
https://github.com/scipag/attacktoolkit
Open-source Exploiting Framework
exploit exploitation exploitation-framework exploiting-vulnerabilities exploiting-windows penetration-testing vulnerability-assessment vulnerability-detection vulnerability-identification vulnerability-scanners
Last synced: 23 Feb 2025
https://github.com/scipag/AttackToolKit
Open-source Exploiting Framework
exploit exploitation exploitation-framework exploiting-vulnerabilities exploiting-windows penetration-testing vulnerability-assessment vulnerability-detection vulnerability-identification vulnerability-scanners
Last synced: 18 Jan 2025
https://github.com/demining/blockchain-attack-vectors
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
attack attacker attacks bitcoin blockchain blockchain-technology cryptocurrency ethereum exploit exploiting exploiting-vulnerabilities hack hacking smart-contracts vulnerabilities vulnerability vulnerability-scanners
Last synced: 11 Jan 2025
https://github.com/yak0d3/ddumper
dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.
auto-exploiter deface drupal drupal-7 drupal-8 drupal8 exploit exploit-kit exploiting-vulnerabilities exploits mass-exploitation-scanner shell vulnerabilities vulnerability-detection vulnerability-scanners
Last synced: 11 Feb 2025
https://github.com/sectool/python-metasploit-framework-database-management
Python - Metasploit-Framework Database Management
exploit exploit-code exploit-database exploit-kit exploitalert exploitation exploitation-framework exploiting-vulnerabilities metasploit metasploit-framework metasploit-framework-database metasploitable payload payload-extraction payload-generation payload-generator payload-interface payloadgenerator payloads python
Last synced: 29 Apr 2025
https://github.com/demining/twist-attack
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
attack attacker bitcoin bitcoin-wallet blockchain blockchain-technology cryptocurrency exploit exploiting exploiting-vulnerabilities hack hacking vulnerabilities vulnerability vulnerability-scanners
Last synced: 11 Jan 2025
https://github.com/demining/twist-attack-2
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
attack attacker bitcoin bitcoin-wallet blockchain blockchain-technology cryptocurrency exploit exploiting exploiting-vulnerabilities hack hacking vulnerabilities vulnerability vulnerability-scanners
Last synced: 01 Mar 2025