Heapinspect🔍Heap analysis tool for CTF pwn.
Stars: ✭ 177 (+704.55%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (+1381.82%)
PythonPython Powered Repository
Stars: ✭ 17 (-22.73%)
ArmpwnRepository to train/learn memory corruption on the ARM platform.
Stars: ✭ 320 (+1354.55%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (+68.18%)
Pwn2own2020Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
Stars: ✭ 314 (+1327.27%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+2072.73%)
Windows kernel resourcesPapers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits
Stars: ✭ 298 (+1254.55%)
IDA WrapperAn IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.
Stars: ✭ 14 (-36.36%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (+68.18%)
PocOrExp in Github聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
Stars: ✭ 544 (+2372.73%)
XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+1004.55%)
Prestashop Cve 2018 19126PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)
Stars: ✭ 37 (+68.18%)
Pwn2exploitall mine papers, pwn & exploit
Stars: ✭ 289 (+1213.64%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+10377.27%)
Cve 2017 11882CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.
Stars: ✭ 280 (+1172.73%)
PoC-BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 83 (+277.27%)
KeyloggerKeylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. Blackcat keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture system screenshot and send to ftp server in given time.
Stars: ✭ 271 (+1131.82%)
Commodity Injection SignaturesCommodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT
Stars: ✭ 267 (+1113.64%)
py4jshellSimulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.
Stars: ✭ 86 (+290.91%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (+1090.91%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (+595.45%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+1095.45%)
BoomERFramework for exploiting local vulnerabilities
Stars: ✭ 84 (+281.82%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (+563.64%)
Penetration testing poc渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Stars: ✭ 3,858 (+17436.36%)
OSCESome exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (+236.36%)
MtpwnPoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
Stars: ✭ 143 (+550%)
EternalblueEternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
Stars: ✭ 150 (+581.82%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (+550%)
ExploitsReal world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (+213.64%)
k8badusbBadUSB Teensy downexec exploit support Windows & Linux / Windows Cmd & PowerShell addUser exploit
Stars: ✭ 32 (+45.45%)
Chimay-Red-tinyThis is a minified exploit for mikrotik routers. It does not require any aditional modules to run.
Stars: ✭ 25 (+13.64%)
All-Discord-ExploitsThis is a list of Discord console scripts, bugs and exploits.
Stars: ✭ 34 (+54.55%)
dirtycowradare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
Stars: ✭ 93 (+322.73%)
destiny-macrosA collection of Destiny 2 macros built with AutoHotKey
Stars: ✭ 24 (+9.09%)
Webrtc LeakCheck if your VPN leaks your IP address via the WebRTC technology
Stars: ✭ 133 (+504.55%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (+59.09%)
jshodanPowerful Shodan API client using RxJava and Retrofit
Stars: ✭ 56 (+154.55%)
cve-2021-3449CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
Stars: ✭ 220 (+900%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (+477.27%)
Exploit Cve 2016 9920Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container
Stars: ✭ 34 (+54.55%)
CVE-2021-33766ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
Stars: ✭ 37 (+68.18%)
PhonesploitA tool for remote ADB exploitation in Python3 for all Machines.
Stars: ✭ 122 (+454.55%)
exploitsSome personal exploits/pocs
Stars: ✭ 52 (+136.36%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+1000%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (+4300%)
TegrarcmguiC++ GUI for TegraRcmSmash (Fusée Gelée exploit for Nintendo Switch)
Stars: ✭ 965 (+4286.36%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (+4.55%)
SpectrepocProof of concept code for the Spectre CPU exploit.
Stars: ✭ 239 (+986.36%)
Cve 2017 0065Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-31.82%)
Awesome Vm Exploit share some useful archives about vm and qemu escape exploit.
Stars: ✭ 239 (+986.36%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+3781.82%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+52018.18%)
ctfCTF programs and writeups
Stars: ✭ 22 (+0%)