OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (+262.96%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+166.67%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (+322.22%)
ExploitrainingsExploitation on different architectures (x86, x64, arm, mips, avr)
Stars: ✭ 29 (+7.41%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-29.63%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+229.63%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+748.15%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (+148.15%)
Exploit Framework🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (+433.33%)
PompemFind exploit tool
Stars: ✭ 786 (+2811.11%)
mec-ngpentest toolbox
Stars: ✭ 28 (+3.7%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (+274.07%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+351.85%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+4774.07%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+229.63%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (+200%)
browser-exploitationA collection of curated resources and CVEs I use for research.
Stars: ✭ 71 (+162.96%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+4196.3%)
AvpwnList of real-world threats against endpoint protection software
Stars: ✭ 179 (+562.96%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (+96.3%)
CVE-2019-8449CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Stars: ✭ 66 (+144.44%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+3144.44%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (+488.89%)
0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (+451.85%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+2811.11%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (+388.89%)
Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (+311.11%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+985.19%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+36440.74%)
OSCESome exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (+174.07%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+4874.07%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+418.52%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+38607.41%)
exploitsSome personal exploits/pocs
Stars: ✭ 52 (+92.59%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+4581.48%)
SecurityexploitsThis repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits
Stars: ✭ 239 (+785.19%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (+200%)
exploitCollection of different exploits
Stars: ✭ 153 (+466.67%)
OseeCollection of things made during my preparation to take on OSEE
Stars: ✭ 69 (+155.56%)
Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+722.22%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+4185.19%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-14.81%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+3874.07%)
OsceCollection of things made during my preparation to take on OSCE
Stars: ✭ 167 (+518.52%)
Kernelhub🌴Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file
Stars: ✭ 972 (+3500%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (+37.04%)
ExploitsContaining Self Made Perl Reproducers / PoC Codes
Stars: ✭ 160 (+492.59%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+2959.26%)
exploitsSome of my public exploits
Stars: ✭ 50 (+85.19%)
Go ShodanShodan API client
Stars: ✭ 158 (+485.19%)
jshodanPowerful Shodan API client using RxJava and Retrofit
Stars: ✭ 56 (+107.41%)
exploitsExploits developed by me.
Stars: ✭ 35 (+29.63%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (+470.37%)