-
Updated
May 27, 2013 - Python
Exploit
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Here are 2,497 public repositories matching this topic...
Guest to host VM escape exploit for Parallels Desktop
-
Updated
Nov 14, 2014 - C++
-
Updated
Mar 3, 2015 - C
CRAX: software CRash analysis for Automatic eXploit generation
-
Updated
Aug 19, 2015 - C
Magento shoplift exploit is vulnerability which was discovered by CheckPoint team (http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/) This python script developed by joren but it was having some bug because of which it was not working properly. If magento version is vulnerable, this script will create admin account with user…
-
Updated
Aug 25, 2015 - Python
Capcha+Email confirmation bypass script
-
Updated
Oct 17, 2015 - JavaScript
Created by The cybersecurity community
- Followers
- 294 followers
- Wikipedia
- Wikipedia