exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+103.33%)
CVE-2019-8449CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Stars: ✭ 66 (+10%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (+90%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-68.33%)
exploitsExploits developed by me.
Stars: ✭ 35 (-41.67%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1360%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+48.33%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+388.33%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (+63.33%)
quick-scriptsA collection of my quick and dirty scripts for vulnerability POC and detections
Stars: ✭ 73 (+21.67%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+923.33%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-61.67%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+1113.33%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+133.33%)
exploitsSome of my public exploits
Stars: ✭ 50 (-16.67%)
AEGPaperAutomatic Exploit Generation Paper
Stars: ✭ 30 (-50%)
jshodanPowerful Shodan API client using RxJava and Retrofit
Stars: ✭ 56 (-6.67%)
phuzzFind exploitable PHP files by parameter fuzzing and function call tracing
Stars: ✭ 53 (-11.67%)
ShannonBasebandScripts, plugins, and information for working with Samsung's Shannon baseband.
Stars: ✭ 69 (+15%)
OSCESome exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (+23.33%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-36.67%)
browser-exploitationA collection of curated resources and CVEs I use for research.
Stars: ✭ 71 (+18.33%)
linksys-wrt54gExploiting Linksys WRT54G using a vulnerability I found.
Stars: ✭ 31 (-48.33%)
ctfCTF programs and writeups
Stars: ✭ 22 (-63.33%)
Browser-ExploitsSome Generic Browser Exploits (For Educational Purposes Only)
Stars: ✭ 27 (-55%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-38.33%)
exploitCollection of different exploits
Stars: ✭ 153 (+155%)
xgadgetFast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-45%)
exploitJust some exploits :P
Stars: ✭ 38 (-36.67%)
cyber-securityCybersecurity stuff for both the blue team and the red team, mostly red though.
Stars: ✭ 34 (-43.33%)
roprA blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative
Stars: ✭ 200 (+233.33%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-20%)
PHP-web-shellswhen i started web application security testing, i fall in love with web shell development and designed some PHP based web shells. This repository contains all my codes which i released in public.
Stars: ✭ 38 (-36.67%)
DrGadgetdr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (+1.67%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (+5%)
sedoppkitA knockoff social-engineer toolkit
Stars: ✭ 46 (-23.33%)
ROP-EmporiumSolutions for ROP Emporium challenges (https://ropemporium.com/) in python.
Stars: ✭ 38 (-36.67%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (-38.33%)
ExploitsReal world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (+15%)
PythonPython Powered Repository
Stars: ✭ 17 (-71.67%)
magisk-fridaYou are probably looking for: https://github.com/ViRb3/magisk-frida
Stars: ✭ 47 (-21.67%)
hsploitAn advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-73.33%)
fastoverflowtkThis Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
Stars: ✭ 16 (-73.33%)
CVE-2016-7255An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Stars: ✭ 85 (+41.67%)
exploitsSome personal exploits/pocs
Stars: ✭ 52 (-13.33%)
BFS2019Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
Stars: ✭ 20 (-66.67%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (+40%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+25%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+281.67%)
LBFHAbout All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
Stars: ✭ 46 (-23.33%)