exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+45.24%)
armroperARM rop chain gadget searcher
Stars: ✭ 36 (-57.14%)
DccwbypassuacWindows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
Stars: ✭ 227 (+170.24%)
ActivereignA Network Enumeration and Attack Toolset for Windows Active Directory Environments.
Stars: ✭ 210 (+150%)
SpectrepocProof of concept code for the Spectre CPU exploit.
Stars: ✭ 239 (+184.52%)
rsGenrsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (-15.48%)
PubVulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb
Stars: ✭ 217 (+158.33%)
overflowA command-line tool for exploiting stack-based buffer overflow vulnerabilities.
Stars: ✭ 66 (-21.43%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+69.05%)
WesngWindows Exploit Suggester - Next Generation
Stars: ✭ 2,675 (+3084.52%)
Cve 2014 0038Linux local root exploit for CVE-2014-0038
Stars: ✭ 193 (+129.76%)
XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+189.29%)
getroot🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS
Stars: ✭ 34 (-59.52%)
KillshotA Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
Stars: ✭ 237 (+182.14%)
CVE-2021-22205GitLab CE/EE Preauth RCE using ExifTool
Stars: ✭ 165 (+96.43%)
Nekobotv1NekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell
Stars: ✭ 225 (+167.86%)
purelovePurelove is a lightweight penetration testing framework, in order to better security testers testing holes with use.
Stars: ✭ 52 (-38.1%)
Angularjs Csti ScannerAutomated client-side template injection (sandbox escape/bypass) detection for AngularJS.
Stars: ✭ 214 (+154.76%)
xss-http-injectorXSS HTTP Inject0r is a proof of concept tool that shows how XSS (Cross Site Scripting) flags can be exploited easily. It is written in HTML + Javascript + PHP and released under GPLv3.
Stars: ✭ 22 (-73.81%)
Ladon大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+3365.48%)
pysploit-frameworkfree exploit framework written use python language version 3.3
Stars: ✭ 33 (-60.71%)
IronsquirrelEncrypted exploit delivery for the masses
Stars: ✭ 197 (+134.52%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+5.95%)
Cve 2020 1472Exploit Code for CVE-2020-1472 aka Zerologon
Stars: ✭ 183 (+117.86%)
ShodanwaveShodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
Stars: ✭ 183 (+117.86%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+2202.38%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+188.1%)
HTPHack The Printer
Stars: ✭ 31 (-63.1%)
Awesome Vm Exploit share some useful archives about vm and qemu escape exploit.
Stars: ✭ 239 (+184.52%)
CVE-2018-2380PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM
Stars: ✭ 55 (-34.52%)
H Encore 2Fully chained kernel exploit for the PS Vita on firmwares 3.65-3.73
Stars: ✭ 237 (+182.14%)
dirtycowradare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
Stars: ✭ 93 (+10.71%)
Lost Nds TvThe Lost Nintendo DS Television Output, brought back to life
Stars: ✭ 221 (+163.1%)
BrahmaBrahma - Privilege elevation exploit for Nintendo 3DS
Stars: ✭ 34 (-59.52%)
ExphubExphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
Stars: ✭ 3,056 (+3538.1%)
Drupalgeddon3Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-78.57%)
Hackers Tool KitIts a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (+151.19%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 211 (+151.19%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+51.19%)
Cve 2019 9810Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Stars: ✭ 200 (+138.1%)
break-fast-serialA proof of concept that demonstrates asynchronous scanning for Java deserialization bugs
Stars: ✭ 53 (-36.9%)
Ciscorv320dumpCVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!
Stars: ✭ 198 (+135.71%)
IAT APIAssembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Stars: ✭ 63 (-25%)
ExpcameraExploit Netwave and GoAhead IP Camera
Stars: ✭ 194 (+130.95%)
AndroratA Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Stars: ✭ 187 (+122.62%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+66.67%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+121.43%)
Php Antimalware ScannerAMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (+115.48%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (-38.1%)
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
Stars: ✭ 69 (-17.86%)
readhookRed-team tool to hook libc read syscall with a buffer overflow vulnerability.
Stars: ✭ 31 (-63.1%)
shu-shellWebshell Jumping Edition
Stars: ✭ 23 (-72.62%)