Skip to content
#

exploits

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

Here are 425 public repositories matching this topic...

Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有11wPOC,已校验有效性并去重)

  • Updated Oct 13, 2024
  • Python

A collection of cheat codes and exploits for the popular game Fallout, providing players with an edge in their gameplay. This repository is a must-have for those looking to enhance their Fallout experience.

  • Updated Oct 5, 2024
  • Squirrel
h4cker

This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.

  • Updated Sep 28, 2024
  • Jupyter Notebook

Created by The cybersecurity community

Followers
288 followers
Wikipedia
Wikipedia

Related Topics

cybersecurity hacking penetration-testing vulnerability-assessment