Unofficial API for 0day.today database | Supported languages: Python and PHP
-
Updated
Nov 22, 2019 - PHP
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Unofficial API for 0day.today database | Supported languages: Python and PHP
My publically disclosed vulnerability reports.
someNworm – PHP auto-worm framework with spread, encrypt, obfuscate & heal.
R4::Webshell
Learn how to use the IndoXploit Modified WebShell. A detailed guide for beginners, including features, commands, and practical examples.
Millhouse Remote code execution exploit
Notes, writeups, and walkthroughs for Hack The Box challenges and labs — covering enumeration, exploitation, privilege escalation, and more.
Created by The cybersecurity community