Skip to content
#

exploit-development

Here are 14 public repositories matching this topic...

Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.

  • Updated Jul 5, 2023
  • C++

The "DLLHijack Injection" tool enables the injection of malicious DLLs into target processes, allowing for DLL hijacking attacks. This technique can be used to exploit vulnerable applications by replacing legitimate DLLs with malicious ones, potentially leading to unauthorized access, data manipulation, or system compromise.

  • Updated May 20, 2023
  • C++

In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.

  • Updated Dec 24, 2024
  • C++

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

  • Updated Dec 24, 2024
  • C++

Improve this page

Add a description, image, and links to the exploit-development topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the exploit-development topic, visit your repo's landing page and select "manage topics."

Learn more