Skip to content
View eexp's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report eexp

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

13 stars written in C
Clear filter

Situational Awareness commands implemented using Beacon Object Files

C 1,613 263 Updated Oct 22, 2025

Dirty Cow exploit - CVE-2016-5195

C 905 427 Updated Jul 30, 2025

A little tool to play with Windows security

C 20,957 3,989 Updated May 11, 2025

使用JNI加密字节码,通过JVMTI解密字节码以保护代码,支持自定义包名和密钥,使用魔法禁止黑客dump字节码

C 178 18 Updated Dec 4, 2024

Syscall免杀

C 511 57 Updated Jun 21, 2024

A beacon object file implementation of PoolParty Process Injection Technique.

C 420 49 Updated Dec 21, 2023

generate CobaltStrike's cross-platform payload

C 2,507 369 Updated Nov 20, 2023

各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC ,该项目将持续更新

C 2,235 866 Updated Sep 12, 2023

CVE-2021-4034 1day

C 2,021 511 Updated Jun 8, 2022

各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC 该项目将不断更新

C 37 18 Updated Mar 30, 2022

A root exploit for CVE-2022-0847 (Dirty Pipe)

C 1,119 221 Updated Mar 8, 2022

bypass disable_functions via LD_PRELOA (no need /usr/sbin/sendmail)

C 1,163 282 Updated Aug 7, 2021