URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
-
Updated
Jun 7, 2024 - C#
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Hourly updated database of exploit and exploitation reports
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
UNIX-like reverse engineering framework and command-line toolset.
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Cybersecurity oriented awesome list
Automated All-in-One OS Command Injection Exploitation Tool.
Automatic SQL injection and database takeover tool
TEAM BAY'S CTF WRITE UP
A collection of my Cyber Security based Python projects for.
This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is accessible to as large an audience as possible and so that everyone has a good resource to learn hacking from.
🔐 Run frida-server on boot with Magisk, always up-to-date
Exploitation and Mitigation Slides
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
Ai000-Rostam (Codename: Ritchie Blackmoore) is a penetration testing tool for windows infrastructure that has been developing by Ai000 Cybernetic QLab as an offensive research project. It can be used in the red-teaming projects and penetration testing of an active directory-based environment.
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."