exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (-58.36%)
Mutual labels: exploits, pwn, ctf, exploitation
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+172.7%)
Mutual labels: pwn, ctf, exploitation
ctf-writeups📚 Yet another CTF writeups repository. PWN and RE tasks
Stars: ✭ 29 (-90.1%)
Mutual labels: pwn, ctf, binary-exploitation
ctfCTF programs and writeups
Stars: ✭ 22 (-92.49%)
Mutual labels: exploits, ctf, binary-exploitation
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-77.47%)
Mutual labels: pwn, ctf, binary-exploitation
how-to-exploit-a-double-freeHow to exploit a double free vulnerability in 2021. Use After Free for Dummies
Stars: ✭ 1,165 (+297.61%)
Mutual labels: pwn, ctf, exploitation
PwndraA collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (+42.32%)
Mutual labels: pwn, ctf, exploitation
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-84.64%)
Mutual labels: pwn, ctf, exploitation
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-93.52%)
Mutual labels: exploits, exploitation
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-71.33%)
Mutual labels: exploits, binary-exploitation
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+109.56%)
Mutual labels: exploits, exploitation
ghidra2dwarf🐉 Export ghidra decompiled code to dwarf sections inside ELF binary
Stars: ✭ 135 (-53.92%)
Mutual labels: pwn, ctf
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-81.91%)
Mutual labels: exploits, ctf
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+148.46%)
Mutual labels: exploits, exploitation
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+266.21%)
Mutual labels: exploits, ctf
exploits challengesChallenges and vulnerabilities exploitation.
Stars: ✭ 60 (-79.52%)
Mutual labels: exploits, exploitation
browser-exploitationA collection of curated resources and CVEs I use for research.
Stars: ✭ 71 (-75.77%)
Mutual labels: exploits, pwn
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+198.98%)
Mutual labels: exploits, exploitation
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (-47.44%)
Mutual labels: exploits, ctf
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-61.09%)
Mutual labels: exploits, exploitation