A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+13.69%)
ActivereignA Network Enumeration and Attack Toolset for Windows Active Directory Environments.
Stars: ✭ 210 (-37.5%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-57.14%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (-73.51%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+933.63%)
EnumEnumeration list for CakePHP 3
Stars: ✭ 27 (-91.96%)
EternalblueEternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
Stars: ✭ 150 (-55.36%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+61.9%)
Enumerate itEnumerations for Ruby with some magic powers! 🎩
Stars: ✭ 300 (-10.71%)
Penetration testing poc渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Stars: ✭ 3,858 (+1048.21%)
Android ExploitsA collection of android Exploits and Hacks
Stars: ✭ 290 (-13.69%)
Exploit-DevelopmentExploit Development - Weaponized Exploit and Proof of Concepts (PoC)
Stars: ✭ 84 (-75%)
Pwn2own2020Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
Stars: ✭ 314 (-6.55%)
xsymlinkXbox One Symbolic Link Exploit: Access restricted/encrypted volumes using the Xbox File Explorer.
Stars: ✭ 18 (-94.64%)
Cve 2017 11882CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.
Stars: ✭ 280 (-16.67%)
external-protocol-floodingScheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Stars: ✭ 603 (+79.46%)
SirepratRemote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)
Stars: ✭ 326 (-2.98%)
ProcspyPython tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..
Stars: ✭ 272 (-19.05%)
All-Discord-ExploitsThis is a list of Discord console scripts, bugs and exploits.
Stars: ✭ 34 (-89.88%)
destiny-macrosA collection of Destiny 2 macros built with AutoHotKey
Stars: ✭ 24 (-92.86%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-89.58%)
Windows kernel resourcesPapers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits
Stars: ✭ 298 (-11.31%)
Commodity Injection SignaturesCommodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT
Stars: ✭ 267 (-20.54%)
cve-2021-3449CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
Stars: ✭ 220 (-34.52%)
ShellverReverse Shell Cheat Sheet TooL
Stars: ✭ 258 (-23.21%)
VbscanOWASP VBScan is a Black Box vBulletin Vulnerability Scanner
Stars: ✭ 295 (-12.2%)
FlameCordPatch for Waterfall to improve performance during attacks and fix memory issues.
Stars: ✭ 103 (-69.35%)
CVE-2018-7750an RCE (remote command execution) approach of CVE-2018-7750
Stars: ✭ 18 (-94.64%)
Pwn2exploitall mine papers, pwn & exploit
Stars: ✭ 289 (-13.99%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-81.85%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (-2.98%)
libsemigroupsC++ library for semigroups and monoids
Stars: ✭ 34 (-89.88%)
LegionAutomatic Enumeration Tool based in Open Source tools
Stars: ✭ 280 (-16.67%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (-9.52%)
ExploitsReal world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (-79.46%)
Macos Kernel ExploitmacOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :)
Stars: ✭ 279 (-16.96%)
Chimay-Red-tinyThis is a minified exploit for mikrotik routers. It does not require any aditional modules to run.
Stars: ✭ 25 (-92.56%)
JsshellAn interactive multi-user web JS shell
Stars: ✭ 330 (-1.79%)
KeyloggerKeylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. Blackcat keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture system screenshot and send to ftp server in given time.
Stars: ✭ 271 (-19.35%)
log4j2-rce-exploitlog4j2 remote code execution or IP leakage exploit (with examples)
Stars: ✭ 62 (-81.55%)
Cve 2019 1003000 Jenkins Rce PocJenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Stars: ✭ 270 (-19.64%)
ArmpwnRepository to train/learn memory corruption on the ARM platform.
Stars: ✭ 320 (-4.76%)
Webcgi ExploitsMulti-language web CGI interfaces exploits.
Stars: ✭ 268 (-20.24%)
PowEnumExecutes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.
Stars: ✭ 62 (-81.55%)
WinEnumScript for Local Windows Enumeration
Stars: ✭ 30 (-91.07%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-92.86%)
SonarsearchA MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (-11.61%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-22.02%)
linkyYet Another LInkedIn Scraper...
Stars: ✭ 44 (-86.9%)
fransReconScript will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated using Sublist3r.
Stars: ✭ 31 (-90.77%)
CelerystalkAn asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.
Stars: ✭ 333 (-0.89%)