Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-51.68%)
Kernelpopkernel privilege escalation enumeration and exploitation framework
Stars: ✭ 628 (+321.48%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-40.27%)
Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (-25.5%)
SecurityexploitsThis repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits
Stars: ✭ 239 (+60.4%)
PocAdvisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (+152.35%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-23.49%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-45.64%)
S2eS2E: A platform for multi-path program analysis with selective symbolic execution.
Stars: ✭ 102 (-31.54%)
OpenvulnapiDocumentation and Tools for Cisco's PSIRT openVuln API
Stars: ✭ 73 (-51.01%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+751.01%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-45.64%)
Anchore EngineA service that analyzes docker images and applies user-defined acceptance policies to allow automated container image validation and certification
Stars: ✭ 1,192 (+700%)
Vuln Web AppsA curated list of vulnerable web applications.
Stars: ✭ 128 (-14.09%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+6521.48%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+678.52%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-55.03%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+624.16%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-10.74%)
Is Website Vulnerablefinds publicly known security vulnerabilities in a website's frontend JavaScript libraries
Stars: ✭ 1,724 (+1057.05%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+801.34%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+620.13%)
Kernelhub🌴Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file
Stars: ✭ 972 (+552.35%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+783.22%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+553.69%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+748.32%)
Awesome SolidityA curated list of awesome Solidity resources
Stars: ✭ 111 (-25.5%)
BugrequestSniffer vulnerabilities in http request (chrome extension)
Stars: ✭ 20 (-86.58%)
VwgenVulnerable Web applications Generator
Stars: ✭ 75 (-49.66%)
NodegoatThe OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Stars: ✭ 1,392 (+834.23%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+6914.09%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+487.92%)
OseeCollection of things made during my preparation to take on OSEE
Stars: ✭ 69 (-53.69%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-32.21%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+676.51%)
Cve Searchcve-search - a tool to perform local searches for known vulnerabilities
Stars: ✭ 1,765 (+1084.56%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+5835.57%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-34.23%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+620.13%)
Exploit Framework🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (-3.36%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-64.43%)
ClairVulnerability Static Analysis for Containers
Stars: ✭ 8,356 (+5508.05%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-16.11%)
ExploitrainingsExploitation on different architectures (x86, x64, arm, mips, avr)
Stars: ✭ 29 (-80.54%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-40.94%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-11.41%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+454.36%)
Dagdaa tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
Stars: ✭ 820 (+450.34%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+5102.68%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-23.49%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+434.23%)
VulncostFind security vulnerabilities in open source npm packages while you code
Stars: ✭ 146 (-2.01%)
SdwannewhopeSD-WAN security and insecurity
Stars: ✭ 141 (-5.37%)