oxasploits
one zero day at a time
SERVICES
CATEGORIES
TAGS
ARCHIVES
WORDLISTS
EXPLOITS
UPTIME
PRIVACY
ABOUT
Tags
Tags
Tags
0day
3
agent
1
aggregation
1
ansvif
1
apache
1
apache2
1
api
1
arrested
1
authentication
2
backup
1
backups
1
bank
1
bash
2
bash-wildcard
1
bitcoin
2
bitcoin-wallet
2
bitcoin-wallet.dat
1
blueteam
3
buffer-overflow
2
buffer-overrun
1
bugs
3
bypass
1
cache
2
chfn
1
chipmonk
1
chsh
1
code-injection
4
config
4
configuration
1
core
1
crack-shadow-password
1
cracking
1
crash
2
crash-course
1
CSP
1
css
1
CVE-2006-3392
1
CVE-2017-5816
1
CVE-2019-15947
1
data
1
detection
1
dump
1
elastic
1
elastic-agent
1
elasticsearch
1
elk
1
elk-elasticsearch-logstash-kibana
1
email
1
encrypted
1
enumeration
1
event
1
executable
1
exitnode
1
expansion
1
exploit
11
exploitation
1
favicon
1
files
1
firewall
2
fuzz
1
fuzzer
1
fuzzing
3
fuzzotron
1
gcc
1
gdb
1
getting started
1
GitHub
1
google analytics
1
hacking
1
hardening
1
hash
1
hosting
1
HP
1
html
1
imagemagick
1
iMC
1
infosec
1
inline
1
ips
1
iptables
2
javascript
1
jekyll
1
john
1
john-the-ripper
1
john-the-ripper-shadow
1
json
1
kibana
1
kibana-log-server
1
LDAP
1
LFI
1
life
1
live
1
locking
1
logging
2
login
1
logs
1
logstash
1
logstash-and-kibana
1
LPE
1
lpe
1
memory
1
minification
1
mitm
1
monitoring
1
multistage
1
ncat
1
network
2
nut
1
oinkmaster
1
openssl
1
openvpn
1
optimization
1
pageviews
1
passwd
1
password
1
passwords
1
paste
1
pcap
1
perl
4
PHP
2
PLAT
1
PoC
5
power-outage
1
primitives
1
privesc
1
prod
1
production
1
push
1
quality
1
radamsa
1
RCE
3
referrer
1
RFI
1
root
1
script
3
secure
1
security
1
services
1
setup
3
sgid
1
shadow
1
shell
1
SQL
1
SQLi
1
SSL
1
stack
1
stack-based
1
stack-overflow
1
suid
1
suricata
1
testing
1
tips
1
tool
1
tools
1
tor
1
tor-bitcoin-wallet
1
tricks
1
tutorial
3
typography
1
userdel
1
vmtouch
1
vulnerabilities
7
vulnerability-research
3
walkthrough
4
wallet
1
wallet.dat
3
webapp
1
webmin
1
webserver
1
website
1
whitepaper
1
wildcard
1
wordlist
1
writing
1
x86_64
1
XPath
1
XSS
1
Getting Started
Writing a New Post
Text and Typography
Enable Google Page Views
Customize the Favicon
exploit
vulnerabilities
PoC
code-injection
config
perl
walkthrough
0day
blueteam
bugs
exploit
vulnerabilities
PoC
code-injection
config
perl
walkthrough
0day
blueteam
bugs