NecromancerIDA Pro V850 Processor Module Extension
Stars: ✭ 21 (-88.2%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-25.84%)
IpyidaIPython console integration for IDA Pro
Stars: ✭ 358 (+101.12%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+205.62%)
PoccollectPoc Collected for study and develop
Stars: ✭ 15 (-91.57%)
external-protocol-floodingScheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Stars: ✭ 603 (+238.76%)
HexrayspytoolsIDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes
Stars: ✭ 873 (+390.45%)
All-Discord-ExploitsThis is a list of Discord console scripts, bugs and exploits.
Stars: ✭ 34 (-80.9%)
obfDetectIDA plugin to pinpoint obfuscated code
Stars: ✭ 99 (-44.38%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+379.78%)
destiny-macrosA collection of Destiny 2 macros built with AutoHotKey
Stars: ✭ 24 (-86.52%)
Ida For DelphiIDA Python Script to Get All function names from Event Constructor (VCL)
Stars: ✭ 92 (-48.31%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-80.34%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+372.47%)
cve-2021-3449CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
Stars: ✭ 220 (+23.6%)
Cve 2020 1206 PocCVE-2020-1206 Uninitialized Kernel Memory Read POC
Stars: ✭ 133 (-25.28%)
Sliding puzzleSwift implementation of the Sliding Puzzle game with Iterative Deepening A* AI Solver.
Stars: ✭ 25 (-85.96%)
Crlf Injection ScannerCommand line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (-48.88%)
CerberusA complete Grabber, sending data to a TCP server that you have to host and stocking all in a database.
Stars: ✭ 32 (-82.02%)
ConfiscateDiscover duplication glitches, abusive staff giving items, x-ray or simply poor server economy.
Stars: ✭ 23 (-87.08%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-62.92%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-14.04%)
ShadowStealPure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Stars: ✭ 186 (+4.49%)
Cve 2020 10199 cve 2020 10204CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.
Stars: ✭ 20 (-88.76%)
sqlinjection-training-appA simple PHP application to learn SQL Injection detection and exploitation techniques.
Stars: ✭ 56 (-68.54%)
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-48.88%)
evilMACHOMalicious use of macho, such as dump-runtime-macho, function-hook.
Stars: ✭ 13 (-92.7%)
ProcjackPoC of injecting code into a running Linux process
Stars: ✭ 17 (-90.45%)
Gr33k图形化漏洞利用集成工具
Stars: ✭ 361 (+102.81%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-26.97%)
goMS17-010Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
Stars: ✭ 67 (-62.36%)
IdaskinsAdvanced skinning plugin for IDA Pro
Stars: ✭ 832 (+367.42%)
idasixIDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with multiple IDA/IDAPython versions
Stars: ✭ 24 (-86.52%)
APSoft-Web-Scanner-v2Powerful dork searcher and vulnerability scanner for windows platform
Stars: ✭ 96 (-46.07%)
Medusa🐈Medusa是一个红队武器库平台,目前包括扫描功能(200+个漏洞)、XSS平台、协同平台、CVE监控等功能,持续开发中 http://medusa.ascotbe.com
Stars: ✭ 796 (+347.19%)
exploitMy exploitDB.
Stars: ✭ 16 (-91.01%)
Ctfsome experience in CTFs
Stars: ✭ 165 (-7.3%)
TrinityTrinity Exploit - Emulator Escape
Stars: ✭ 371 (+108.43%)
UnlockdownDisabling kernel lockdown on Ubuntu without physical access
Stars: ✭ 62 (-65.17%)
ScratchabitEasily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
Stars: ✭ 369 (+107.3%)
HEVD Kernel ExploitExploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.
Stars: ✭ 44 (-75.28%)
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (-51.12%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (-46.07%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-28.65%)
WebpocketExploit management framework
Stars: ✭ 142 (-20.22%)
Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (-37.64%)
Poc Exppoc or exp of android vulnerability
Stars: ✭ 362 (+103.37%)
Javadeserh2hcSample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).
Stars: ✭ 361 (+102.81%)
Sap exploitHere you can get full exploit for SAP NetWeaver AS JAVA
Stars: ✭ 60 (-66.29%)
ThreatmapperIdentify vulnerabilities in running containers, images, hosts and repositories
Stars: ✭ 361 (+102.81%)