Penetration testing poc渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Stars: ✭ 3,858 (+249.77%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-89.03%)
1earn个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (-29.65%)
WeirdaalWeirdAAL (AWS Attack Library)
Stars: ✭ 503 (-54.4%)
AriaCloudA Docker container for remote penetration testing.
Stars: ✭ 105 (-90.48%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (-79.42%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-93.11%)
minipwnerA script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".
Stars: ✭ 53 (-95.19%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (-50.68%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (-24.39%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-75.7%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (-51.22%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (-91.75%)
Esp Rfid ToolA tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into an existing installation. Provides access to a web based interface using WiFi in AP or Client mode. Will work with nearly all devices that contain a standard 5V Wiegand interface. Primary target group is 26-37bit HID Cards. Similar to the Tastic RFID Thief, Blekey, and ESPKey.
Stars: ✭ 262 (-76.25%)
hathiA dictionary attack tool for PostgreSQL and MSSQL
Stars: ✭ 33 (-97.01%)
dnstakeDNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover
Stars: ✭ 723 (-34.45%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-76.61%)
frisbeeCollect email addresses by crawling search engine results.
Stars: ✭ 29 (-97.37%)
A2svAuto Scanning to SSL Vulnerability
Stars: ✭ 524 (-52.49%)
brutekragPenetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Stars: ✭ 30 (-97.28%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-92.2%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (-95.29%)
rustcatRustcat(rcat) - The modern Port listener and Reverse shell
Stars: ✭ 505 (-54.22%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-53.13%)
WPA2-FritzBox-Pswd-Wordlist-GeneratorThis Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16 Numbers in length. So it could get a bit large.
Stars: ✭ 22 (-98.01%)
klustair(Deprecated) Submit all images in your Kubernetes cluster to Anchore for a vulnerability check and check your configuration with kubeaudit
Stars: ✭ 15 (-98.64%)
cdCloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting and other exploitable vulnerabilities.
Stars: ✭ 33 (-97.01%)
Commando VmComplete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution.
[email protected] Stars: ✭ 5,030 (+356.03%)
NSE-scriptsNSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
Stars: ✭ 105 (-90.48%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-95.65%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-54.31%)
aemscanAdobe Experience Manager Vulnerability Scanner
Stars: ✭ 161 (-85.4%)
mondoo🕵️♀️ Mondoo Cloud-Native Security & Vulnerability Risk Management
Stars: ✭ 60 (-94.56%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-96.55%)
PompemFind exploit tool
Stars: ✭ 786 (-28.74%)
waithaxAn implementation of the waithax / slowhax 3DS Kernel11 exploit.
Stars: ✭ 64 (-94.2%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (-54.67%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-87.31%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-97.91%)
astam-correlatorVulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple static/dynamic scans
Stars: ✭ 22 (-98.01%)
Openvas ScannerOpen Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
Stars: ✭ 1,056 (-4.26%)
xsymlinkXbox One Symbolic Link Exploit: Access restricted/encrypted volumes using the Xbox File Explorer.
Stars: ✭ 18 (-98.37%)
Dsinternals Directory Services Internals (DSInternals) PowerShell Module and Framework
Stars: ✭ 776 (-29.65%)
ExploitsReal world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (-93.74%)
log4jscanwinLog4j Vulnerability Scanner for Windows
Stars: ✭ 142 (-87.13%)
external-protocol-floodingScheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Stars: ✭ 603 (-45.33%)
xss-chefA web application for generating custom XSS payloads
Stars: ✭ 70 (-93.65%)