3rd-party lists
Iot
Browser
Desktop apps
Web apps
- immunIT/drupwn - Drupal enumeration & exploitation tool
- phpMyAdmin 4.8.4 - 'AllowArbitraryServer' Arbitrary File Read
Windows general
- WindowsExploits/Exploits - A curated archive of complied and tested public Windows exploits
- itm4n/Ikeext-Privesc - Windows IKEEXT DLL Hijacking Exploit Tool
- zcgonvh/MS16-032 - MS16-032(CVE-2016-0099) for SERVICE ONLY
- danigargu/explodingcan - An implementation of NSA's ExplodingCan exploit in Python
- saaramar/execve_exploit - Hardcore corruption of my execve() vulnerability in WSL
- dzonerzy/acunetix_0day - Acunetix 0day RCE - (SYSTEM)
- Microsoft SharePoint 'Limited Access' Permission Bypass
- tevora-threat/eternal_blue_powershell - Port of eternal blue exploits to powershell
- preempt/credssp - A code demonstrating CVE-2018-0886
- mez0cc/MS17-010_WORAWIT - MS17-010: Python and Meterpreter
- Rotten potato
- decoder-it/lonelypotato - Modified version of RottenPotatoNG C++
- Cn33liz/Tater - a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit
- breenmachine/RottenPotatoNG - New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools
Virtual Machines
Java
Uncategorized