XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+22.73%)
Heap ViewerAn IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+189.9%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (+193.43%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (-55.05%)
Antimalware ResearchResearch on Anti-malware and other related security solutions
Stars: ✭ 163 (-17.68%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+342.42%)
AndroratAndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+71.72%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (-38.38%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+174.75%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-34.34%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-81.31%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-90.4%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-27.27%)
Cve 2019 9810Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Stars: ✭ 200 (+1.01%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-29.29%)
SubRosaBasic tool to automate backdooring PE files
Stars: ✭ 48 (-75.76%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+210.1%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-77.27%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-35.86%)
exploitsSome of my public exploits
Stars: ✭ 50 (-74.75%)
PythonPython Powered Repository
Stars: ✭ 17 (-91.41%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+303.54%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+353.03%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+2172.73%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-22.73%)
Butthaxlovense hush buttplug exploit chain
Stars: ✭ 180 (-9.09%)
RopaGUI tool to create ROP chains using the ropper API
Stars: ✭ 151 (-23.74%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-25.76%)
Vulnerable KextA WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Stars: ✭ 188 (-5.05%)
Cod Exploits☠️ Call of Duty - Vulnerabilities and proof-of-concepts
Stars: ✭ 178 (-10.1%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-26.26%)
Heapinspect🔍Heap analysis tool for CTF pwn.
Stars: ✭ 177 (-10.61%)
Magisk Frida🔐 Run frida-server on boot with Magisk, always up-to-date
Stars: ✭ 144 (-27.27%)
FuxploiderFile upload vulnerability scanner and exploitation tool.
Stars: ✭ 1,997 (+908.59%)
ExpcameraExploit Netwave and GoAhead IP Camera
Stars: ✭ 194 (-2.02%)
AndroratA Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Stars: ✭ 187 (-5.56%)
Xerrorfully automated pentesting tool
Stars: ✭ 173 (-12.63%)
MtpwnPoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
Stars: ✭ 143 (-27.78%)
SvscannerSVScanner - Scanner Vulnerability And MaSsive Exploit.
Stars: ✭ 143 (-27.78%)
KarkinosA thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (-14.14%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-27.78%)
JexbossJexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
Stars: ✭ 2,008 (+914.14%)
Cve 2020 1472Exploit Code for CVE-2020-1472 aka Zerologon
Stars: ✭ 183 (-7.58%)
JsshellJSshell - JavaScript reverse/remote shell
Stars: ✭ 167 (-15.66%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (-29.8%)
BlazefoxBlazefox exploits for Windows 10 RS5 64-bit.
Stars: ✭ 134 (-32.32%)
Cve 2020 0688 expCVE-2020-0688_EXP Auto trigger payload & encrypt method
Stars: ✭ 134 (-32.32%)
Cve 2014 0038Linux local root exploit for CVE-2014-0038
Stars: ✭ 193 (-2.53%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-6.06%)
ExpdevbadcharsBad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
Stars: ✭ 167 (-15.66%)
Webrtc LeakCheck if your VPN leaks your IP address via the WebRTC technology
Stars: ✭ 133 (-32.83%)
Uac exploitEscalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: ✭ 165 (-16.67%)
Poc T渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
Stars: ✭ 1,722 (+769.7%)