VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+538.5%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+2795.01%)
VbscanOWASP VBScan is a Black Box vBulletin Vulnerability Scanner
Stars: ✭ 295 (-18.28%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-86.7%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+134.63%)
JoomscanOWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+77.29%)
ShodanwaveShodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
Stars: ✭ 183 (-49.31%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (-9.7%)
Angularjs Csti ScannerAutomated client-side template injection (sandbox escape/bypass) detection for AngularJS.
Stars: ✭ 214 (-40.72%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-64.82%)
CVE-2019-10149CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Stars: ✭ 15 (-95.84%)
x64dbgpylibPort of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.
Stars: ✭ 46 (-87.26%)
Scripts-SploitsA number of scripts POC's and problems solved as pentests move along.
Stars: ✭ 37 (-89.75%)
apple-knowledgeA collection of reverse engineered Apple things, as well as a machine-readable database of Apple hardware
Stars: ✭ 338 (-6.37%)
HEVD Kernel ExploitExploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.
Stars: ✭ 44 (-87.81%)
CamRaptorCamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (-70.64%)
vulristicsExtensible framework for analyzing publicly available information about vulnerabilities
Stars: ✭ 46 (-87.26%)
hackKubernetes security and vulnerability tools and utilities.
Stars: ✭ 56 (-84.49%)
discord-bugs-exploitsA Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-93.91%)
prl guest to hostGuest to host VM escape exploit for Parallels Desktop
Stars: ✭ 26 (-92.8%)
PwnX.py🏴☠️ Pwn misconfigured sites running ShareX custom image uploader API through chained exploit
Stars: ✭ 30 (-91.69%)
exploitCollection of different exploits
Stars: ✭ 153 (-57.62%)
doonaNetwork based protocol fuzzer
Stars: ✭ 64 (-82.27%)
ExploitsA personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
Stars: ✭ 75 (-79.22%)
SpringBootExploit项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
Stars: ✭ 1,060 (+193.63%)
ronin-exploitsA Ruby micro-framework for writing and running exploits
Stars: ✭ 36 (-90.03%)
iskanKubernetes Native, Runtime Container Image Scanning
Stars: ✭ 35 (-90.3%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-87.53%)
BinV👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.
Stars: ✭ 25 (-93.07%)
CTFCTF binary exploit code
Stars: ✭ 37 (-89.75%)
APSoft-Web-Scanner-v2Powerful dork searcher and vulnerability scanner for windows platform
Stars: ✭ 96 (-73.41%)
CamOverCamOver is a camera exploitation tool that allows to disclosure network camera admin password.
Stars: ✭ 217 (-39.89%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-94.74%)
RedTeam toolkitRed Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Stars: ✭ 301 (-16.62%)
ProxyLogonProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)
Stars: ✭ 112 (-68.98%)
FastPwnCTF中Pwn的快速利用模板(包含awd pwn)
Stars: ✭ 18 (-95.01%)
ospdOSPd is a framework for vulnerability scanners which share the same communication protocol: OSP (Open Scanner Protocol)
Stars: ✭ 32 (-91.14%)
goMS17-010Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
Stars: ✭ 67 (-81.44%)
shakeitoffWindows MSI Installer LPE (CVE-2021-43883)
Stars: ✭ 68 (-81.16%)
IDA WrapperAn IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.
Stars: ✭ 14 (-96.12%)
AxonUnrestricted Lua Execution
Stars: ✭ 59 (-83.66%)
scan-cli-pluginDocker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (-62.6%)
padreBlazing fast, advanced Padding Oracle exploit
Stars: ✭ 35 (-90.3%)
PythonPython Powered Repository
Stars: ✭ 17 (-95.29%)
spellbookFramework for rapid development and reusable of security tools
Stars: ✭ 67 (-81.44%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (-66.2%)
exploitMy exploitDB.
Stars: ✭ 16 (-95.57%)
RageRage allows you to execute any file in a Microsoft Office document.
Stars: ✭ 68 (-81.16%)
vulnerablecodeA free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (-25.48%)
k8badusbBadUSB Teensy downexec exploit support Windows & Linux / Windows Cmd & PowerShell addUser exploit
Stars: ✭ 32 (-91.14%)