Dark Mode

Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

Exploit

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

Here are 3,243 public repositories matching this topic...

This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security, vulnerability research, exploit development, reverse engineering, and more. Also check: https://hackertraining.org

  • Updated Feb 27, 2026
  • Jupyter Notebook

Shen Tou Ce Shi You Guan De POC, EXP, Jiao Ben , Ti Quan , Xiao Gong Ju Deng ---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms

  • Updated Feb 27, 2026
  • HTML

K8Gong Ju He Ji (Nei Wang Shen Tou /Ti Quan Gong Ju /Yuan Cheng Yi Chu /Lou Dong Li Yong /Sao Miao Gong Ju /Mi Ma Po Jie /Mian Sha Gong Ju /Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/Ove rFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)

  • Updated Jan 25, 2025
  • PowerShell

LadonDa Xing Nei Wang Shen Tou Sao Miao Qi ,PowerShell, Cobalt StrikeCha Jian , Nei Cun Jia Zai , Wu Wen Jian Sao Miao . Han Duan Kou Sao Miao , Fu Wu Shi Bie , Wang Luo Zi Chan Tan Ce , Mi Ma Shen Ji , Gao Wei Lou Dong Jian Ce , Lou Dong Li Yong , Mi Ma Du Qu Yi Ji Yi Jian GetShell,Zhi Chi Pi Liang ADuan /BDuan /CDuan Yi Ji Kua Wang Duan Sao Miao ,Zhi Chi URL, Zhu Ji , Yu Ming Lie Biao Sao Miao Deng . Wang Luo Zi Chan Tan Ce 32Chong Xie Yi (ICMP\NBT\DNS\MAC\SMB\WMI\SSH\HTTP\HTTPS\Exchange\mssql\FTP\ RDP)Huo Fang Fa Kuai Su Huo Qu Mu Biao Wang Luo Cun Huo Zhu Ji IP, Ji Suan Ji Ming , Gong Zuo Zu , Gong Xiang Zi Yuan , Wang Qia Di Zhi , Cao Zuo Xi Tong Ban Ben , Wang Zhan , Zi Yu Ming , Zhong Jian Jian , Kai Fang Fu Wu , Lu You Qi , Jiao Huan Ji , Shu Ju Ku , Da Yin Ji Deng ,Da Liang Gao Wei Lou Dong Jian Ce Mo Kuai MS17010, Zimbra, Exchange

  • Updated Mar 24, 2025
  • C#

Created by The cybersecurity community

Followers
368 followers
Website
github.com/topics/exploit
Wikipedia
Wikipedia

Related topics

cybersecurity hacking penetration-testing vulnerability-assessment