SvscannerSVScanner - Scanner Vulnerability And MaSsive Exploit.
Stars: ✭ 143 (-12.27%)
Gdb StaticPublic repository of static GDB and GDBServer
Stars: ✭ 103 (-36.81%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-9.82%)
PhonesploitA tool for remote ADB exploitation in Python3 for all Machines.
Stars: ✭ 122 (-25.15%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-36.81%)
RopaGUI tool to create ROP chains using the ropper API
Stars: ✭ 151 (-7.36%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-38.04%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-22.09%)
JexbossJexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
Stars: ✭ 2,008 (+1131.9%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (+724.54%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-22.09%)
Mqtt PwnMQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
Stars: ✭ 156 (-4.29%)
BughunterTools for Bug Hunting
Stars: ✭ 95 (-41.72%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-22.7%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-42.94%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+707.36%)
IllacceptanythingThe project where literally anything* goes.
Stars: ✭ 1,756 (+977.3%)
CrypterCrypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encryption | Evil Code is executed by bruteforcing the decryption key, and then executing the decrypted evil code
Stars: ✭ 125 (-23.31%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+699.39%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+701.23%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+6934.36%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+6311.66%)
Clamav DevelClamAV Development - FAQ is here: https://github.com/Cisco-Talos/clamav-faq
Stars: ✭ 1,301 (+698.16%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (-14.72%)
Blueborne ScannerBluetooth scanner for local devices that may be vulnerable to Blueborne exploit
Stars: ✭ 125 (-23.31%)
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-44.17%)
GldGo shellcode LoaDer
Stars: ✭ 91 (-44.17%)
Awesome Arm ExploitationA collection of awesome videos, articles, books and resources about ARM exploitation.
Stars: ✭ 125 (-23.31%)
EggshelliOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+688.96%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (+691.41%)
VxsigAutomatically generate AV byte signatures from sets of similar binaries.
Stars: ✭ 139 (-14.72%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-23.31%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-45.4%)
Search LibcWeb wrapper of niklasb/libc-database
Stars: ✭ 124 (-23.93%)
HumanoidNode.js package to bypass CloudFlare's anti-bot JavaScript challenges
Stars: ✭ 88 (-46.01%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+685.89%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (-2.45%)
FlashsploitExploitation Framework for ATtiny85 Based HID Attacks
Stars: ✭ 155 (-4.91%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-10.43%)
PsbypassclmBypass for PowerShell Constrained Language Mode
Stars: ✭ 138 (-15.34%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-23.93%)
On PwningMy solutions to some CTF challenges and a list of interesting resources about pwning stuff
Stars: ✭ 87 (-46.63%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-46.63%)
WhatwafDetect and bypass web application firewalls and protection systems
Stars: ✭ 1,881 (+1053.99%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-25.15%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-46.63%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+668.71%)
Magisk Frida🔐 Run frida-server on boot with Magisk, always up-to-date
Stars: ✭ 144 (-11.66%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-16.56%)