Awesome Arm ExploitationA collection of awesome videos, articles, books and resources about ARM exploitation.
Stars: ✭ 125 (-33.86%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-57.14%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+2280.95%)
RopaGUI tool to create ROP chains using the ropper API
Stars: ✭ 151 (-20.11%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-59.79%)
PwndraA collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (+120.63%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+113.23%)
BafBlind Attacking Framework
Stars: ✭ 71 (-62.43%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (+91.01%)
KarkinosA thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (-10.05%)
Sqli HunterSQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
Stars: ✭ 340 (+79.89%)
Binary ExploitationGood to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-75.13%)
AndroratAndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+79.89%)
ShurikenCross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.
Stars: ✭ 114 (-39.68%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+433.86%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (+56.61%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-23.81%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-67.72%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+187.83%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-74.6%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+363.49%)
r2con-prequals-rhme3r2 the Rhme3! The RHme (Riscure Hack me) is a low level hardware CTF that comes in the form of an Arduino board (AVR architecture). It involves a set of SW and HW challenges to test your skills in different areas such as side channel analysis, fault injection, reverse-engineering and software exploitation. In our talk we will briefly recap RHme2…
Stars: ✭ 15 (-92.06%)
BlisqyVersion 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
Stars: ✭ 179 (-5.29%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (-66.67%)
Leviathanwide range mass audit toolkit
Stars: ✭ 862 (+356.08%)
AEGPaperAutomatic Exploit Generation Paper
Stars: ✭ 30 (-84.13%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-48.15%)
ShannonBasebandScripts, plugins, and information for working with Samsung's Shannon baseband.
Stars: ✭ 69 (-63.49%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+374.6%)
ROP-EmporiumSolutions for ROP Emporium challenges (https://ropemporium.com/) in python.
Stars: ✭ 38 (-79.89%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (-26.46%)
AtscanAdvanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (+332.28%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-60.32%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-89.95%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+4001.59%)
Mqtt PwnMQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
Stars: ✭ 156 (-17.46%)
BinexpLinux Binary Exploitation
Stars: ✭ 742 (+292.59%)
DrGadgetdr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (-67.72%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-50.79%)
linksys-wrt54gExploiting Linksys WRT54G using a vulnerability I found.
Stars: ✭ 31 (-83.6%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+275.66%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (-35.45%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-31.22%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (+256.08%)
Vulnerable KextA WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Stars: ✭ 188 (-0.53%)
Xerrorfully automated pentesting tool
Stars: ✭ 173 (-8.47%)
FlashsploitExploitation Framework for ATtiny85 Based HID Attacks
Stars: ✭ 155 (-17.99%)
Poc T渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
Stars: ✭ 1,722 (+811.11%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (+582.54%)
AttifyosAttify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (+225.4%)