PatrowlHearsDataOpen-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
Discord-Console-hacksA collection of JavaScript Codes I've made to enhance the User Experience of Discord and some other Discord related stuff
PoC-BankFocus on cybersecurity | collection of PoC and Exploits
BoomERFramework for exploiting local vulnerabilities
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
dirtycowradare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
xss-http-injectorXSS HTTP Inject0r is a proof of concept tool that shows how XSS (Cross Site Scripting) flags can be exploited easily. It is written in HTML + Javascript + PHP and released under GPLv3.
readhookRed-team tool to hook libc read syscall with a buffer overflow vulnerability.
overflowA command-line tool for exploiting stack-based buffer overflow vulnerabilities.
break-fast-serialA proof of concept that demonstrates asynchronous scanning for Java deserialization bugs
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
getroot🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS
CVE-2018-2380PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM
rsGenrsGen is a Reverse Shell Payload Generator for hacking.
BrahmaBrahma - Privilege elevation exploit for Nintendo 3DS
purelovePurelove is a lightweight penetration testing framework, in order to better security testers testing holes with use.
Drupalgeddon3Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
inthewilddbHourly updated database of exploit and exploitation reports
IAT APIAssembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.