0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (+776.47%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+7800%)
ExploitsContaining Self Made Perl Reproducers / PoC Codes
Stars: ✭ 160 (+841.18%)
CVE-2019-8449CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Stars: ✭ 66 (+288.24%)
Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (+552.94%)
browser-exploitationA collection of curated resources and CVEs I use for research.
Stars: ✭ 71 (+317.65%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+723.53%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+7335.29%)
OseeCollection of things made during my preparation to take on OSEE
Stars: ✭ 69 (+305.88%)
OsceCollection of things made during my preparation to take on OSCE
Stars: ✭ 167 (+882.35%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+1247.06%)
Go ShodanShodan API client
Stars: ✭ 158 (+829.41%)
exploitsExploits developed by me.
Stars: ✭ 35 (+105.88%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (+676.47%)
exploitsSome of my public exploits
Stars: ✭ 50 (+194.12%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+57935.29%)
ctfCTF programs and writeups
Stars: ✭ 22 (+29.41%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+61376.47%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+1623.53%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (+376.47%)
SecurityexploitsThis repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits
Stars: ✭ 239 (+1305.88%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+6705.88%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+6211.76%)
AvpwnList of real-world threats against endpoint protection software
Stars: ✭ 179 (+952.94%)
exploitsSome personal exploits/pocs
Stars: ✭ 52 (+205.88%)
exploitCollection of different exploits
Stars: ✭ 153 (+800%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (+835.29%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (+35.29%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (+805.88%)
discord-bugs-exploitsA Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (+29.41%)
Exploit Framework🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (+747.06%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (+211.76%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (+570.59%)
OSCESome exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (+335.29%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (+494.12%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (+476.47%)
hsploitAn advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-5.88%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+7641.18%)
mec-ngpentest toolbox
Stars: ✭ 28 (+64.71%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+423.53%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (+117.65%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (+376.47%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (+11.76%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+323.53%)
Browser-ExploitsSome Generic Browser Exploits (For Educational Purposes Only)
Stars: ✭ 27 (+58.82%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+6723.53%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+423.53%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (+294.12%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (+11.76%)
jshodanPowerful Shodan API client using RxJava and Retrofit
Stars: ✭ 56 (+229.41%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+617.65%)
Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+1205.88%)