PompemFind exploit tool
Stars: ✭ 786 (+391.25%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-88.12%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+196.25%)
Ossf Cve BenchmarkThe OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebases using a variety of static analysis security testing (SAST) tools and generate reports to evaluate those tools.
Stars: ✭ 71 (-55.62%)
Cve 2018 8120CVE-2018-8120 Windows LPE exploit
Stars: ✭ 447 (+179.38%)
WpreconWPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-15.62%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+158.13%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+625%)
EqgrpDecrypted content of eqgrp-auction-file.tar.xz
Stars: ✭ 3,743 (+2239.38%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-58.12%)
PocAdvisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (+135%)
0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (-6.87%)
WebmapWebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (+123.13%)
ApiVulners Python API wrapper
Stars: ✭ 313 (+95.63%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+6066.25%)
BootstompBootStomp: a bootloader vulnerability finder
Stars: ✭ 303 (+89.38%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (+76.88%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+1898.75%)
IvaIVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
Stars: ✭ 49 (-69.37%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+739.38%)
discord-bugs-exploitsA Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-86.25%)
LabsVulnerability Labs for security analysis
Stars: ✭ 1,002 (+526.25%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+690%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+355%)
nvdcveNVD/CVE as JSON files
Stars: ✭ 79 (-50.62%)
Go ShodanShodan API client
Stars: ✭ 158 (-1.25%)
Cve ApiUnofficial api for cve.mitre.org
Stars: ✭ 36 (-77.5%)
log4jscanwinLog4j Vulnerability Scanner for Windows
Stars: ✭ 142 (-11.25%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-45%)
exploitJust some exploits :P
Stars: ✭ 38 (-76.25%)
Snyk Js Jquery 174006patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428
Stars: ✭ 21 (-86.87%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-76.87%)
Cve Searchcve-search - a tool to perform local searches for known vulnerabilities
Stars: ✭ 1,765 (+1003.13%)
cyber-securityCybersecurity stuff for both the blue team and the red team, mostly red though.
Stars: ✭ 34 (-78.75%)
PoccollectPoc Collected for study and develop
Stars: ✭ 15 (-90.62%)
freakerautomation framework for kenzerdb
Stars: ✭ 17 (-89.37%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+447.5%)
LinuxflawThis repo records all the vulnerabilities of linux software I have reproduced in my local workspace
Stars: ✭ 140 (-12.5%)
vulnerablecodeA free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (+68.13%)
hsploitAn advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-90%)
Medusa🐈Medusa是一个红队武器库平台,目前包括扫描功能(200+个漏洞)、XSS平台、协同平台、CVE监控等功能,持续开发中 http://medusa.ascotbe.com
Stars: ✭ 796 (+397.5%)
cwe-sdk-javascriptA Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC
Stars: ✭ 18 (-88.75%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+391.25%)
ctfCTF programs and writeups
Stars: ✭ 22 (-86.25%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-28.75%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-49.37%)
IsfISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
Stars: ✭ 690 (+331.25%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (-0.62%)
Kernelpopkernel privilege escalation enumeration and exploitation framework
Stars: ✭ 628 (+292.5%)
Pigatpigat ( Passive Intelligence Gathering Aggregation Tool ) 被动信息收集聚合工具
Stars: ✭ 140 (-12.5%)
Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (-30.62%)