All Categories → Security → exploitation

Top 154 exploitation open source projects

SQL-Injection-cheat-sheet
Cheatsheet to exploit and learn SQL Injection.
Bash
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
phuzz
Find exploitable PHP files by parameter fuzzing and function call tracing
volana
🌒 Shell command obfuscation to avoid detection systems
DrGadget
dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
sedoppkit
A knockoff social-engineer toolkit
linksys-wrt54g
Exploiting Linksys WRT54G using a vulnerability I found.
fastoverflowtk
This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
LBFH
About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
PXXTF
Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Jiraffe
One stop place for exploiting Jira instances in your proximity
OverRide
Binary Exploitation and Reverse-Engineering (from assembly into C)
titanm
This repository contains the tools we used in our research on the Google Titan M chip
NTU-Computer-Security
台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
CandyPotato
Pure C++, weaponized, fully automated implementation of RottenPotatoNG
bisc
Borrowed Instructions Synthetic Computation
121-154 of 154 exploitation projects