tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+57.3%)
Mutual labels: exploit, cybersecurity, exploits, exploitation
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (+61.8%)
Mutual labels: exploit, enumeration, exploitation
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+11642.7%)
Mutual labels: exploit, cybersecurity, exploits
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+37.08%)
Mutual labels: exploit, exploits, exploitation
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+239.33%)
Mutual labels: cybersecurity, enumeration, hacking-tool
HostEnumeratorA tool that automates the process of enumeration
Stars: ✭ 29 (-67.42%)
Mutual labels: cybersecurity, enumeration, hacking-tool
exploitsSome of my public exploits
Stars: ✭ 50 (-43.82%)
Mutual labels: exploit, exploits, exploitation
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+589.89%)
Mutual labels: exploit, exploits, exploitation
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+432.58%)
Mutual labels: exploit, exploits, hacking-tool
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+329.21%)
Mutual labels: exploit, cybersecurity, enumeration
Active Directory Exploitation Cheat SheetA cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+1464.04%)
Mutual labels: enumeration, exploitation, hacking-tool
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+884.27%)
Mutual labels: exploit, exploits, exploitation
Active Directory Exploitation Cheat SheetA cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+877.53%)
Mutual labels: enumeration, exploitation, hacking-tool
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-31.46%)
Mutual labels: cybersecurity, enumeration, exploitation
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-78.65%)
Mutual labels: exploit, exploits, exploitation
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+907.87%)
Mutual labels: exploit, exploitation, hacking-tool
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-42.7%)
Mutual labels: exploit, cybersecurity, hacking-tool
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (+13.48%)
Mutual labels: exploit, exploits
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+1408.99%)
Mutual labels: exploit, exploits
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (+39.33%)
Mutual labels: exploit, hacking-tool