Skip to content
View 0dayCTF's full-sized avatar
😃
Hacking the planet 🚀
😃
Hacking the planet 🚀

Block or report 0dayCTF

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.
Showing results

Remake of CVE-2020-9484 by Pentestical

Python 11 Updated Sep 16, 2024

httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.

Go 7,545 823 Updated Sep 30, 2024

real time face swap and one-click video deepfake with only a single image

Python 37,559 5,342 Updated Oct 3, 2024

a signal handler race condition in OpenSSH's server (sshd)

C 459 181 Updated Jul 1, 2024

A simple go Proof of Concept to start a new shell as TrustedInstaller

Go 45 8 Updated Sep 11, 2023

Run a program as TrustedInstaller (SYSTEM)

Visual Basic 6.0 82 10 Updated Sep 14, 2024

Blazing fast, advanced Padding Oracle exploit

Go 230 22 Updated May 13, 2024

A couple of different scripts, made to automate attacks against NoSQL databases.

Python 54 11 Updated Mar 13, 2024

ASIC and FPGA miner in c for bitcoin

C 3,568 1,614 Updated May 27, 2020

Autofill Phishing

HTML 45 2 Updated Jul 7, 2024

🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.

Python 2,578 358 Updated Jun 18, 2024

A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.

Go 490 70 Updated Jun 22, 2022

Analyze your tryhackme progress!

Python 9 Updated May 27, 2024

nodejsscan is a static security code scanner for Node.js applications.

CSS 2,383 326 Updated Aug 10, 2024

Bookmarklet to find endpoints easily with one click

40 9 Updated May 19, 2024

Official DeepSound repository migrated from jpinsoft.net. DeepSound is a freeware steganography tool and audio converter that hides secret data into audio files. The application also enables you to…

143 10 Updated Apr 15, 2024

PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server

PowerShell 2,444 460 Updated Aug 20, 2024

A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)

Python 23 6 Updated Mar 1, 2024

The FindMy Flipper app turns your FlipperZero into an AirTag or other tracking device, compatible with Apple AirTags and Samsung SmartTag and Tile Trackers. It uses the BLE beacon to broadcast, all…

Python 1,501 48 Updated Aug 16, 2024

A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for e…

Nim 76 21 Updated Jan 23, 2024

HTTP Request Smuggling over HTTP/2 Cleartext (h2c)

Python 641 98 Updated May 10, 2022

🤖🏴‍☠️ radare2 plugin for GPT-4 🦜. Solve crackmes automatically 🪄

Python 262 15 Updated Feb 20, 2024

CVE-2024-21413 PoC for THM Lab

Python 28 8 Updated Mar 13, 2024

Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.

4,928 1,020 Updated Aug 14, 2024

LLaMA: Open and Efficient Foundation Language Models

Python 2,804 312 Updated Nov 8, 2023

Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)

Go 991 77 Updated Feb 19, 2024

Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan & VirusTotal!

Python 1,682 193 Updated Jul 3, 2024

Python version of the C# tool for "Shadow Credentials" attacks

Python 578 66 Updated Aug 4, 2024

Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.

C# 794 97 Updated May 22, 2024
Next