titanmThis repository contains the tools we used in our research on the Google Titan M chip
Stars: ✭ 149 (+148.33%)
Browser-ExploitsSome Generic Browser Exploits (For Educational Purposes Only)
Stars: ✭ 27 (-55%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-38.33%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (+40%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+25%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+281.67%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+1828.33%)
exploitCollection of different exploits
Stars: ✭ 153 (+155%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-25%)
xgadgetFast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-45%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-68.33%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+111.67%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-20%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (+278.33%)
PHP-web-shellswhen i started web application security testing, i fall in love with web shell development and designed some PHP based web shells. This repository contains all my codes which i released in public.
Stars: ✭ 38 (-36.67%)
DrGadgetdr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (+1.67%)
AvpwnList of real-world threats against endpoint protection software
Stars: ✭ 179 (+198.33%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (+5%)
sedoppkitA knockoff social-engineer toolkit
Stars: ✭ 46 (-23.33%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (+165%)
ROP-EmporiumSolutions for ROP Emporium challenges (https://ropemporium.com/) in python.
Stars: ✭ 38 (-36.67%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (+156.67%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (-38.33%)
Exploit Framework🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (+140%)
ExploitsReal world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (+15%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1688.33%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (+68.33%)
SubRosaBasic tool to automate backdooring PE files
Stars: ✭ 48 (-20%)
Kernelhub🌴Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file
Stars: ✭ 972 (+1520%)
magisk-fridaYou are probably looking for: https://github.com/ViRb3/magisk-frida
Stars: ✭ 47 (-21.67%)
ExploitrainingsExploitation on different architectures (x86, x64, arm, mips, avr)
Stars: ✭ 29 (-51.67%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+1276.67%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+48.33%)
fastoverflowtkThis Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
Stars: ✭ 16 (-73.33%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (+35%)
CVE-2016-7255An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Stars: ✭ 85 (+41.67%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+20%)
BFS2019Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
Stars: ✭ 20 (-66.67%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+1833.33%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (+11.67%)
LBFHAbout All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
Stars: ✭ 46 (-23.33%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-11.67%)
PompemFind exploit tool
Stars: ✭ 786 (+1210%)
discord-bugs-exploitsA Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-63.33%)
shellexC-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & 010 editor
Stars: ✭ 89 (+48.33%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+161.67%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+806.67%)
empirectfEmpireCTF – write-ups, capture the flag, cybersecurity
Stars: ✭ 122 (+103.33%)
r2con-prequals-rhme3r2 the Rhme3! The RHme (Riscure Hack me) is a low level hardware CTF that comes in the form of an Arduino board (AVR architecture). It involves a set of SW and HW challenges to test your skills in different areas such as side channel analysis, fault injection, reverse-engineering and software exploitation. In our talk we will briefly recap RHme2…
Stars: ✭ 15 (-75%)
freakerautomation framework for kenzerdb
Stars: ✭ 17 (-71.67%)