DeepfakeHTTPDeepfakeHTTP is a web server that uses HTTP dumps as a source for responses.
Stars: ✭ 373 (+104.95%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+649.45%)
PoccollectPoc Collected for study and develop
Stars: ✭ 15 (-91.76%)
destiny-macrosA collection of Destiny 2 macros built with AutoHotKey
Stars: ✭ 24 (-86.81%)
log4j2-rce-exploitlog4j2 remote code execution or IP leakage exploit (with examples)
Stars: ✭ 62 (-65.93%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+381.32%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-80.77%)
sqlinjection-training-appA simple PHP application to learn SQL Injection detection and exploitation techniques.
Stars: ✭ 56 (-69.23%)
ConfiscateDiscover duplication glitches, abusive staff giving items, x-ray or simply poor server economy.
Stars: ✭ 23 (-87.36%)
evilMACHOMalicious use of macho, such as dump-runtime-macho, function-hook.
Stars: ✭ 13 (-92.86%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5642.31%)
Gr33k图形化漏洞利用集成工具
Stars: ✭ 361 (+98.35%)
Cve 2020 10199 cve 2020 10204CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.
Stars: ✭ 20 (-89.01%)
goMS17-010Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
Stars: ✭ 67 (-63.19%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-30.22%)
ProcjackPoC of injecting code into a running Linux process
Stars: ✭ 17 (-90.66%)
SpringBootExploit项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
Stars: ✭ 1,060 (+482.42%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-51.1%)
PocProof of Concepts
Stars: ✭ 809 (+344.51%)
HEVD Kernel ExploitExploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.
Stars: ✭ 44 (-75.82%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (-15.38%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+339.01%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (-47.25%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+603.85%)
doonaNetwork based protocol fuzzer
Stars: ✭ 64 (-64.84%)
Pocsuite poc collectcollection poc use pocsuite framework 收集一些 poc with pocsuite框架
Stars: ✭ 127 (-30.22%)
x64dbgpylibPort of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.
Stars: ✭ 46 (-74.73%)
HtshellsSelf contained htaccess shells and attacks
Stars: ✭ 708 (+289.01%)
Cve 2020 1206 PocCVE-2020-1206 Uninitialized Kernel Memory Read POC
Stars: ✭ 133 (-26.92%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+637.91%)
cve-2021-3449CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
Stars: ✭ 220 (+20.88%)
front-end-visual-comparison-tool🔮🔬Front-End testing tool which can be used to create a side by side visual comparison between your live site and local site.
Stars: ✭ 16 (-91.21%)
Spectre AttackExample of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Stars: ✭ 690 (+279.12%)
IDA WrapperAn IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.
Stars: ✭ 14 (-92.31%)
Uac exploitEscalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: ✭ 165 (-9.34%)
spellbookFramework for rapid development and reusable of security tools
Stars: ✭ 67 (-63.19%)
JoomscanOWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+251.65%)
fake-web-eventsCreates a Simulation of Fake Web Events
Stars: ✭ 48 (-73.63%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-52.2%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+237.36%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-30.77%)
ARL-NPoC集漏洞验证和任务运行的一个框架
Stars: ✭ 73 (-59.89%)
WindowsexploitsWindows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
Stars: ✭ 1,243 (+582.97%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+369.23%)
MS17010EXPLadon Moudle MS17010 Exploit for PowerShell
Stars: ✭ 40 (-78.02%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+365.38%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-53.85%)
CerberusA complete Grabber, sending data to a TCP server that you have to host and stocking all in a database.
Stars: ✭ 32 (-82.42%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+362.09%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-63.74%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (+219.23%)