ExploitsContaining Self Made Perl Reproducers / PoC Codes
Stars: ✭ 160 (+321.05%)
Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (+192.11%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-39.47%)
Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+484.21%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+3226.32%)
0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (+292.11%)
Browser-ExploitsSome Generic Browser Exploits (For Educational Purposes Only)
Stars: ✭ 27 (-28.95%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+3434.21%)
SecurityexploitsThis repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits
Stars: ✭ 239 (+528.95%)
OseeCollection of things made during my preparation to take on OSEE
Stars: ✭ 69 (+81.58%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (-2.63%)
OsceCollection of things made during my preparation to take on OSCE
Stars: ✭ 167 (+339.47%)
discord-bugs-exploitsA Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-42.11%)
Go ShodanShodan API client
Stars: ✭ 158 (+315.79%)
exploitsSome personal exploits/pocs
Stars: ✭ 52 (+36.84%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (+247.37%)
freakerautomation framework for kenzerdb
Stars: ✭ 17 (-55.26%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+25863.16%)
exploitsSome of my public exploits
Stars: ✭ 50 (+31.58%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+27402.63%)
exploitCollection of different exploits
Stars: ✭ 153 (+302.63%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (+113.16%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+671.05%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+134.21%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+2952.63%)
browser-exploitationA collection of curated resources and CVEs I use for research.
Stars: ✭ 71 (+86.84%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-50%)
AvpwnList of real-world threats against endpoint protection software
Stars: ✭ 179 (+371.05%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (+318.42%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+221.05%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (+305.26%)
ctfCTF programs and writeups
Stars: ✭ 22 (-42.11%)
Exploit Framework🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (+278.95%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+502.63%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (+200%)
cyber-securityCybersecurity stuff for both the blue team and the red team, mostly red though.
Stars: ✭ 34 (-10.53%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (+165.79%)
CVE-2019-8449CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Stars: ✭ 66 (+73.68%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (+157.89%)
jshodanPowerful Shodan API client using RxJava and Retrofit
Stars: ✭ 56 (+47.37%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+3363.16%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+134.21%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (+113.16%)
mec-ngpentest toolbox
Stars: ✭ 28 (-26.32%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+89.47%)
exploitsExploits developed by me.
Stars: ✭ 35 (-7.89%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-50%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-2.63%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (+121.05%)
hsploitAn advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-57.89%)
OSCESome exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (+94.74%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+268.42%)