image-upload-exploits

Exploit files

A repository of media file exploits for penetration testing and bug bounty hunting

This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests and bug bounty.

GitHub

320 stars
8 watching
78 forks
Language: PostScript
last commit: over 3 years ago

Related projects:

Repository Description Stars
cryptogenic/exploit-writeups A collection of technical writeups on kernel exploits and webkit vulnerabilities for various platforms 749
pedrib/poc Contains public advisories, exploits, and code related to vulnerabilities and hacking. 821
thec00n/uploader A Burp extension tool to test for directory traversal attacks in insecure file uploads. 5
abatchy17/windowsexploits A collection of precompiled Windows exploit binaries 1,831
emo-crab/scap-rs A collection of Rust libraries for working with vulnerability data from various sources. 16
externalist/exploit_playground An archive of publicly available or privately disclosed exploit code analysis and reverse engineering efforts. 613
grrrdog/sploits A collection of Proof Of Concept exploits and demonstrations 17
lockedbyte/cve-exploits A collection of proof-of-concept exploits for specific software vulnerabilities 675
arimogi/google-dorks A collection of tools and techniques for exploiting vulnerabilities in Google services 45
babyteam1024/cve-2021-2394 An exploit for a Java vulnerability 9
misterch0c/malsploitbase A repository of publicly available malware exploits targeting specific infrastructure. 538
rosehgal/binexp A tutorial project on exploiting binary files and writing payloads to manipulate program behavior 1,303
belane/linux-soft-exploit-suggester A script to identify vulnerabilities in software packages on Linux systems 222
smgorelik/windows-rce-exploits A repository of remote code execution exploit samples and proof-of-concepts for Windows. 740
bkerler/exploit_me An educational platform showcasing 14 different types of vulnerabilities in ARM/AARCH64 applications through CTF-style exploitation tutorials. 895