IsfISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.
Stars: ✭ 161 (-12.02%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5610.93%)
Cve 2020 1206 PocCVE-2020-1206 Uninitialized Kernel Memory Read POC
Stars: ✭ 133 (-27.32%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-51.37%)
Heapinspect🔍Heap analysis tool for CTF pwn.
Stars: ✭ 177 (-3.28%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-30.6%)
Gasyori100knockimage processing codes to understand algorithm
Stars: ✭ 1,988 (+986.34%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-52.46%)
Pocsuite poc collectcollection poc use pocsuite framework 收集一些 poc with pocsuite框架
Stars: ✭ 127 (-30.6%)
WindowsexploitsWindows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
Stars: ✭ 1,243 (+579.23%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+6165.57%)
AngelswordPython3编写的CMS漏洞检测框架
Stars: ✭ 1,223 (+568.31%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-31.15%)
CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (-56.83%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (-15.85%)
UnauthdA local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Stars: ✭ 79 (-56.83%)
Blueborne ScannerBluetooth scanner for local devices that may be vulnerable to Blueborne exploit
Stars: ✭ 125 (-31.69%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-16.39%)
Search LibcWeb wrapper of niklasb/libc-database
Stars: ✭ 124 (-32.24%)
Clickjacking TesterA python script designed to check if the website if vulnerable of clickjacking and create a poc
Stars: ✭ 72 (-60.66%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-32.24%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-60.66%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (+540.98%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-19.67%)
Gopoc用cel-go重现了长亭xray的poc检测功能的轮子
Stars: ✭ 124 (-32.24%)
CtfSome of my CTF solutions
Stars: ✭ 70 (-61.75%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+532.24%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-33.33%)
ShodanwaveShodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
Stars: ✭ 183 (+0%)
Butthaxlovense hush buttplug exploit chain
Stars: ✭ 180 (-1.64%)
ExpdevbadcharsBad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
Stars: ✭ 167 (-8.74%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-19.13%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+965.03%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-65.57%)
SafilerSafari local file reader
Stars: ✭ 118 (-35.52%)
UnlockdownDisabling kernel lockdown on Ubuntu without physical access
Stars: ✭ 62 (-66.12%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-20.22%)
Sap exploitHere you can get full exploit for SAP NetWeaver AS JAVA
Stars: ✭ 60 (-67.21%)
Bitp0wnAlgorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.
Stars: ✭ 59 (-67.76%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+489.62%)
Uac exploitEscalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: ✭ 165 (-9.84%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-21.31%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-37.7%)
NtrghidraFully Featured Nintendo DS Loader for Ghidra
Stars: ✭ 56 (-69.4%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-72.13%)
Pythempentest framework
Stars: ✭ 1,060 (+479.23%)
Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (-39.34%)
Twitter Follow ExploitAutomated Twitter mass account creation and follow using Selenium and Tor VPN
Stars: ✭ 47 (-74.32%)
Ddos RootsecDDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-40.98%)