Exploit
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Here are 2,269 public repositories matching this topic...
Binary Exploitation CTF
-
Updated
Feb 18, 2023 - C
an rce Vulnerability finder or affirmator
-
Updated
Aug 29, 2023 - Python
This is a sort of Java porting of the Python exploit at: https://www.exploit-db.com/exploits/41570/.
-
Updated
Mar 10, 2018 - Java
Ansible role to check the vulnerability tracked as CVE-2018-19788, impacts PolicyKit version 0.115 which comes pre-installed on a wide range of Linux distributions
-
Updated
Dec 10, 2018 - Shell
a collection of public root slides & WPs....
-
Updated
Feb 23, 2019
Own solutions for the the amazing course "Introduccion al Reversing con IDA Pro" by Ricardo Narvaja.
-
Updated
Jun 28, 2019 - Python
-
Updated
Sep 2, 2020 - Shell
My writeups for challenges on CTFwiki
-
Updated
May 19, 2020
This repo is a deep-dive into the Eternal Blue buffer overflow attack, included is the exploit source code, and extensive documentation.
-
Updated
Apr 14, 2022 - Python
Web page with the visualization of an exploit for a vulnerability of Marvin Minsky's universal Turing machine
-
Updated
May 17, 2021 - HTML
-
Updated
Nov 12, 2021
Exploit for Be A Parkour Ninja, the ROBLOX game.
-
Updated
Jun 19, 2023
CVE-2022-35513 | blink1-pass-decrypt
-
Updated
Aug 15, 2022 - JavaScript
Created by The cybersecurity community
- Followers
- 269 followers
- Wikipedia
- Wikipedia