This repository contains a collection of custom-built exploits for penetration testing and security research purposes. All exploits are designed to demonstrate various attack vectors and techniques to enhance cybersecurity knowledge.
For authorized use only: Ensure you have permission before testing any system.
The creators are not responsible for any damage caused by the misuse of these tools.
Use ethically and responsibly.