Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+665.52%)
AvpwnList of real-world threats against endpoint protection software
Stars: ✭ 179 (+517.24%)
OsceCollection of things made during my preparation to take on OSCE
Stars: ✭ 167 (+475.86%)
ExploitsContaining Self Made Perl Reproducers / PoC Codes
Stars: ✭ 160 (+451.72%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (+448.28%)
Go ShodanShodan API client
Stars: ✭ 158 (+444.83%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (+431.03%)
0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (+413.79%)
Exploit Framework🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (+396.55%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (+355.17%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (+293.1%)
Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (+282.76%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (+248.28%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+33920.69%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (+237.93%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+4531.03%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+4437.93%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+35937.93%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+206.9%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+4258.62%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (+179.31%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (+179.31%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+148.28%)
OseeCollection of things made during my preparation to take on OSEE
Stars: ✭ 69 (+137.93%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+3900%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+3889.66%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (+131.03%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+3600%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (+82.76%)
Kernelhub🌴Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file
Stars: ✭ 972 (+3251.72%)