A WIP game focused on hacking
-
Updated
Feb 26, 2025 - C
A WIP game focused on hacking
Simple Script which can be used to brute force to get results from Babu Banarasi Das University website.
This presentation contains very precise yet detailed explanation of concepts of a very interesting topic -- Reinforcement Learning.
A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam
COMING SOON Standalone POC of the main exploit used in MNSPlusTrasher
Detection of vulnerable web pages based on a given directory path.
My pwnable.kr solutions (CTFs)
Experimental intelligence gathering from devices compromised with HIDOL
Project Evoli. PyPi Extention for Creating Loggers,Grabbers and Rats
Google Translate Translation Exploit
A game I researched, got arbitrary code execution on the game server.
CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server
Vulnerability research, firmware analysis, reverse engineering, programming notes (as much as I can)
Complet Tool exploit joomla servers
WORDPRESS BRUTE FORCE Upload Shell FREE TOOL by Hackfut Security
Collider-ng: A simple, fast tool for hash collisions and exploitation, featuring a built-in hash identifier, ideal for CTFs and pentesting.
Active Directory enumeration and exploitation tool
An exemplary application that shows strengths and weaknesses of Google's TCMalloc implementation through simple, yet most complete program, adding the document with found possible exploits enumeration
Awesome Exploit Development
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."