PwinSecurity Evaluation of Dynamic Binary Instrumentation Engines
Stars: ✭ 70 (-62.96%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-45.5%)
RopperDisplay information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
Stars: ✭ 1,218 (+544.44%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+322.75%)
FoxpwnExploit code for CVE-2016-9066
Stars: ✭ 39 (-79.37%)
FuxploiderFile upload vulnerability scanner and exploitation tool.
Stars: ✭ 1,997 (+956.61%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+3722.22%)
BughunterTools for Bug Hunting
Stars: ✭ 95 (-49.74%)
Exploit WriteupsA collection where my current and future writeups for exploits/CTF will go
Stars: ✭ 676 (+257.67%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-33.86%)
Magisk Frida🔐 Run frida-server on boot with Magisk, always up-to-date
Stars: ✭ 144 (-23.81%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-76.19%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-39.68%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-80.42%)
Antimalware ResearchResearch on Anti-malware and other related security solutions
Stars: ✭ 163 (-13.76%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (+611.11%)
WindowsAwesome tools to exploit Windows !
Stars: ✭ 816 (+331.75%)
BlazefoxBlazefox exploits for Windows 10 RS5 64-bit.
Stars: ✭ 134 (-29.1%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+285.19%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+589.42%)
On PwningMy solutions to some CTF challenges and a list of interesting resources about pwning stuff
Stars: ✭ 87 (-53.97%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (+256.08%)
Awesome Arm ExploitationA collection of awesome videos, articles, books and resources about ARM exploitation.
Stars: ✭ 125 (-33.86%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-57.14%)
RopaGUI tool to create ROP chains using the ropper API
Stars: ✭ 151 (-20.11%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-59.79%)
BafBlind Attacking Framework
Stars: ✭ 71 (-62.43%)
KarkinosA thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (-10.05%)
Binary ExploitationGood to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-75.13%)
ShurikenCross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.
Stars: ✭ 114 (-39.68%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+433.86%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-23.81%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+363.49%)
BlisqyVersion 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
Stars: ✭ 179 (-5.29%)
Leviathanwide range mass audit toolkit
Stars: ✭ 862 (+356.08%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-48.15%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+374.6%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (-26.46%)
AtscanAdvanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (+332.28%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+4001.59%)
Mqtt PwnMQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
Stars: ✭ 156 (-17.46%)
BinexpLinux Binary Exploitation
Stars: ✭ 742 (+292.59%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-50.79%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+275.66%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-31.22%)
EggshelliOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+580.42%)
Vulnerable KextA WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Stars: ✭ 188 (-0.53%)
Xerrorfully automated pentesting tool
Stars: ✭ 173 (-8.47%)
FlashsploitExploitation Framework for ATtiny85 Based HID Attacks
Stars: ✭ 155 (-17.99%)
Poc T渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
Stars: ✭ 1,722 (+811.11%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (+582.54%)