maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
phuzzFind exploitable PHP files by parameter fuzzing and function call tracing
volana🌒 Shell command obfuscation to avoid detection systems
DrGadgetdr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
linksys-wrt54gExploiting Linksys WRT54G using a vulnerability I found.
PythonPython Powered Repository
exploitingExploiting challenges in Linux and Windows
fastoverflowtkThis Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
BFS2019Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
LBFHAbout All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
SubRosaBasic tool to automate backdooring PE files
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
JiraffeOne stop place for exploiting Jira instances in your proximity
OverRideBinary Exploitation and Reverse-Engineering (from assembly into C)
titanmThis repository contains the tools we used in our research on the Google Titan M chip
contextualContextual Bandits in R - simulation and evaluation of Multi-Armed Bandit Policies
Hack4Squad💀 A bash hacking and scanning framework.
CandyPotatoPure C++, weaponized, fully automated implementation of RottenPotatoNG
inthewilddbHourly updated database of exploit and exploitation reports
biscBorrowed Instructions Synthetic Computation
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.