Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-22.73%)
ShurikenCross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.
Stars: ✭ 114 (-42.42%)
Butthaxlovense hush buttplug exploit chain
Stars: ✭ 180 (-9.09%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-42.42%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-25.76%)
Ddos RootsecDDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-45.45%)
Vulnerable KextA WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Stars: ✭ 188 (-5.05%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-46.97%)
Magisk Frida🔐 Run frida-server on boot with Magisk, always up-to-date
Stars: ✭ 144 (-27.27%)
Heapinspect🔍Heap analysis tool for CTF pwn.
Stars: ✭ 177 (-10.61%)
FuxploiderFile upload vulnerability scanner and exploitation tool.
Stars: ✭ 1,997 (+908.59%)
ExpcameraExploit Netwave and GoAhead IP Camera
Stars: ✭ 194 (-2.02%)
Cve 2019 1458CVE-2019-1458 Windows LPE Exploit
Stars: ✭ 101 (-48.99%)
SvscannerSVScanner - Scanner Vulnerability And MaSsive Exploit.
Stars: ✭ 143 (-27.78%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-50.51%)
KarkinosA thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (-14.14%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+578.28%)
JexbossJexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
Stars: ✭ 2,008 (+914.14%)
BughunterTools for Bug Hunting
Stars: ✭ 95 (-52.02%)
Cve 2020 1472Exploit Code for CVE-2020-1472 aka Zerologon
Stars: ✭ 183 (-7.58%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+558.08%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (-29.8%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5178.28%)
EggshelliOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+549.49%)
Cve 2020 0688 expCVE-2020-0688_EXP Auto trigger payload & encrypt method
Stars: ✭ 134 (-32.32%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-55.05%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+546.97%)
On PwningMy solutions to some CTF challenges and a list of interesting resources about pwning stuff
Stars: ✭ 87 (-56.06%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-56.06%)
Uac exploitEscalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: ✭ 165 (-16.67%)
Poc T渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
Stars: ✭ 1,722 (+769.7%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-35.86%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-56.06%)
BlisqyVersion 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
Stars: ✭ 179 (-9.6%)
Ctfsome experience in CTFs
Stars: ✭ 165 (-16.67%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-35.86%)
WindowsexploitsWindows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
Stars: ✭ 1,243 (+527.78%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-58.59%)
PhonesploitA tool for remote ADB exploitation in Python3 for all Machines.
Stars: ✭ 122 (-38.38%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-59.09%)
RopperDisplay information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
Stars: ✭ 1,218 (+515.15%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+1064.14%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-36.36%)
CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (-60.1%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+5690.91%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-4.04%)
ShodanwaveShodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
Stars: ✭ 183 (-7.58%)
UnauthdA local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Stars: ✭ 79 (-60.1%)
Blueborne ScannerBluetooth scanner for local devices that may be vulnerable to Blueborne exploit
Stars: ✭ 125 (-36.87%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-61.62%)
Awesome Arm ExploitationA collection of awesome videos, articles, books and resources about ARM exploitation.
Stars: ✭ 125 (-36.87%)