shellexC-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & 010 editor
Stars: ✭ 89 (+48.33%)
IsfISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
Stars: ✭ 690 (+1050%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+690%)
kahoot-toolsA website for interacting with kahoot games.
Stars: ✭ 63 (+5%)
RoothelperA Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.
Stars: ✭ 416 (+593.33%)
ctfCTF programs and writeups
Stars: ✭ 22 (-63.33%)
EqgrpDecrypted content of eqgrp-auction-file.tar.xz
Stars: ✭ 3,743 (+6138.33%)
BoomERFramework for exploiting local vulnerabilities
Stars: ✭ 84 (+40%)
PocAdvisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (+526.67%)
ApiVulners Python API wrapper
Stars: ✭ 313 (+421.67%)
titanmThis repository contains the tools we used in our research on the Google Titan M chip
Stars: ✭ 149 (+148.33%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (+371.67%)
Browser-ExploitsSome Generic Browser Exploits (For Educational Purposes Only)
Stars: ✭ 27 (-55%)
CVE-StockpileMaster list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
Stars: ✭ 41 (-31.67%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-38.33%)
XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+305%)
CommixAutomated All-in-One OS Command Injection Exploitation Tool.
Stars: ✭ 3,016 (+4926.67%)
exploitCollection of different exploits
Stars: ✭ 153 (+155%)
ShellabLinux and Windows shellcode enrichment utility
Stars: ✭ 225 (+275%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-25%)
Cve 2019 9810Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Stars: ✭ 200 (+233.33%)
xgadgetFast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-45%)
Ciscorv320dumpCVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!
Stars: ✭ 198 (+230%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-68.33%)
XropTool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC
Stars: ✭ 195 (+225%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+111.67%)
BlisqyVersion 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
Stars: ✭ 179 (+198.33%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-20%)
KarkinosA thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (+183.33%)
Kernelpopkernel privilege escalation enumeration and exploitation framework
Stars: ✭ 628 (+946.67%)
RopaGUI tool to create ROP chains using the ropper API
Stars: ✭ 151 (+151.67%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (+278.33%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (+140%)
PHP-web-shellswhen i started web application security testing, i fall in love with web shell development and designed some PHP based web shells. This repository contains all my codes which i released in public.
Stars: ✭ 38 (-36.67%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (+131.67%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (+116.67%)
DrGadgetdr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (+1.67%)
Awesome Arm ExploitationA collection of awesome videos, articles, books and resources about ARM exploitation.
Stars: ✭ 125 (+108.33%)
AvpwnList of real-world threats against endpoint protection software
Stars: ✭ 179 (+198.33%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (+5%)
ShurikenCross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.
Stars: ✭ 114 (+90%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (+71.67%)
sedoppkitA knockoff social-engineer toolkit
Stars: ✭ 46 (-23.33%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (+165%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+806.67%)
empirectfEmpireCTF – write-ups, capture the flag, cybersecurity
Stars: ✭ 122 (+103.33%)
r2con-prequals-rhme3r2 the Rhme3! The RHme (Riscure Hack me) is a low level hardware CTF that comes in the form of an Arduino board (AVR architecture). It involves a set of SW and HW challenges to test your skills in different areas such as side channel analysis, fault injection, reverse-engineering and software exploitation. In our talk we will briefly recap RHme2…
Stars: ✭ 15 (-75%)
freakerautomation framework for kenzerdb
Stars: ✭ 17 (-71.67%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+178.33%)
RouterosRouterOS Security Research Tooling and Proof of Concepts
Stars: ✭ 603 (+905%)