CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (+17.91%)
ProxyLogonProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)
Stars: ✭ 112 (+67.16%)
vulristicsExtensible framework for analyzing publicly available information about vulnerabilities
Stars: ✭ 46 (-31.34%)
CamRaptorCamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (+58.21%)
AxonUnrestricted Lua Execution
Stars: ✭ 59 (-11.94%)
IDA WrapperAn IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.
Stars: ✭ 14 (-79.1%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+82.09%)
mRemoteNG-DecryptPython script to decrypt passwords stored by mRemoteNG
Stars: ✭ 96 (+43.28%)
apple-knowledgeA collection of reverse engineered Apple things, as well as a machine-readable database of Apple hardware
Stars: ✭ 338 (+404.48%)
doonaNetwork based protocol fuzzer
Stars: ✭ 64 (-4.48%)
hackKubernetes security and vulnerability tools and utilities.
Stars: ✭ 56 (-16.42%)
ronin-exploitsA Ruby micro-framework for writing and running exploits
Stars: ✭ 36 (-46.27%)
shakeitoffWindows MSI Installer LPE (CVE-2021-43883)
Stars: ✭ 68 (+1.49%)
discord-bugs-exploitsA Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-67.16%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+25.37%)
exploitMy exploitDB.
Stars: ✭ 16 (-76.12%)
k8badusbBadUSB Teensy downexec exploit support Windows & Linux / Windows Cmd & PowerShell addUser exploit
Stars: ✭ 32 (-52.24%)
spellbookFramework for rapid development and reusable of security tools
Stars: ✭ 67 (+0%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+43.28%)
batchqlGraphQL security auditing script with a focus on performing batch GraphQL queries and mutations
Stars: ✭ 251 (+274.63%)
RootMyTV.github.ioRootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.
Stars: ✭ 745 (+1011.94%)
simple-ransomwareSimple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!
Stars: ✭ 29 (-56.72%)
Umbraco-RCEUmbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
Stars: ✭ 61 (-8.96%)
CTFCTF binary exploit code
Stars: ✭ 37 (-44.78%)
HEVD Kernel ExploitExploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.
Stars: ✭ 44 (-34.33%)
CamOverCamOver is a camera exploitation tool that allows to disclosure network camera admin password.
Stars: ✭ 217 (+223.88%)
x64dbgpylibPort of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.
Stars: ✭ 46 (-31.34%)
prl guest to hostGuest to host VM escape exploit for Parallels Desktop
Stars: ✭ 26 (-61.19%)
SpringBootExploit项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
Stars: ✭ 1,060 (+1482.09%)
PwnX.py🏴☠️ Pwn misconfigured sites running ShareX custom image uploader API through chained exploit
Stars: ✭ 30 (-55.22%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-71.64%)
CVE-2019-10149CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Stars: ✭ 15 (-77.61%)
Ultimate-Guitar-HackThe first tool to download any Guitar Pro file, including 'Official' from Ultimate Guitar
Stars: ✭ 61 (-8.96%)
Ransomware-ReportsThis repo is a collection of Ransomware reports from vendors, researchers, etc.
Stars: ✭ 90 (+34.33%)
FastPwnCTF中Pwn的快速利用模板(包含awd pwn)
Stars: ✭ 18 (-73.13%)
PythonPython Powered Repository
Stars: ✭ 17 (-74.63%)
nemucod decryptRuby tool to decrypt Nemucod ransomware
Stars: ✭ 21 (-68.66%)
padreBlazing fast, advanced Padding Oracle exploit
Stars: ✭ 35 (-47.76%)
exploit-CVE-2015-3306ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container
Stars: ✭ 97 (+44.78%)
RageRage allows you to execute any file in a Microsoft Office document.
Stars: ✭ 68 (+1.49%)
expdevVulnerable software and exploits used for OSCP/OSCE preparation
Stars: ✭ 24 (-64.18%)
JavaRansomwareSimple Ransomware Tool in Pure Java
Stars: ✭ 99 (+47.76%)
go-gtfogtfo, now with the speed of golang
Stars: ✭ 59 (-11.94%)
Discord-Block-BypassSimple script that utilities discord's flaw in detecting who blocked who.
Stars: ✭ 24 (-64.18%)
exploitCollection of different exploits
Stars: ✭ 153 (+128.36%)
CRAXCRAX: software CRash analysis for Automatic eXploit generation
Stars: ✭ 44 (-34.33%)
fusee-nanoA minimalist re-implementation of the Fusée Gelée exploit (http://memecpy.com), designed to run on embedded Linux devices. (Zero dependencies)
Stars: ✭ 49 (-26.87%)
ExploitsA personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
Stars: ✭ 75 (+11.94%)
petya keyA decoder for Petya victim keys, using the Janus' masterkey.
Stars: ✭ 35 (-47.76%)
APSoft-Web-Scanner-v2Powerful dork searcher and vulnerability scanner for windows platform
Stars: ✭ 96 (+43.28%)
wownedAuthentication bypass for outdated WoW emulation authentication servers
Stars: ✭ 32 (-52.24%)