InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (+340.28%)
BugrequestSniffer vulnerabilities in http request (chrome extension)
Stars: ✭ 20 (-72.22%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (+706.94%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+1390.28%)
Uxss Db🔪Browser logic vulnerabilities ☠️
Stars: ✭ 565 (+684.72%)
Vulapps快速搭建各种漏洞环境(Various vulnerability environment)
Stars: ✭ 3,353 (+4556.94%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (+687.5%)
GitgrabergitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (+1516.67%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+594.44%)
IosMost usable tools for iOS penetration testing
Stars: ✭ 563 (+681.94%)
Githack.git 泄漏利用工具,可还原历史版本
Stars: ✭ 501 (+595.83%)
FfmFreedom Fighting Mode: open source hacking harness
Stars: ✭ 302 (+319.44%)
PoccollectPoc Collected for study and develop
Stars: ✭ 15 (-79.17%)
GowaptGo Web Application Penetration Test
Stars: ✭ 300 (+316.67%)
Browserghost这是一个抓取浏览器密码的工具,后续会添加更多功能
Stars: ✭ 559 (+676.39%)
Windows kernel resourcesPapers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits
Stars: ✭ 298 (+313.89%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-26.39%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+593.06%)
PwndropSelf-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
Stars: ✭ 878 (+1119.44%)
PegaswitchPegaSwitch is an exploit toolkit for the Nintendo Switch
Stars: ✭ 922 (+1180.56%)
Pwn2exploitall mine papers, pwn & exploit
Stars: ✭ 289 (+301.39%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-12.5%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+4723.61%)
Cdk ConstructsA collection of higher-level aws cdk constructs: slack-approval-workflow, #slack & msteams notifications, chatops, blue-green-container-deployment, codecommit-backup, OWASP dependency-check, contentful-webhook, github-webhook, stripe-webhook, static-website, pull-request-check, pull-request-approval-rule, codepipeline-merge-action, codepipeline-check-parameter-action...
Stars: ✭ 282 (+291.67%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+1095.83%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (+293.06%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+39579.17%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-27.78%)
ConfiscateDiscover duplication glitches, abusive staff giving items, x-ray or simply poor server economy.
Stars: ✭ 23 (-68.06%)
Owasp VwadThe OWASP Vulnerable Web Applications Directory project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
Stars: ✭ 487 (+576.39%)
SecurecodeboxsecureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (+287.5%)
SecdevlabsA laboratory for learning secure web and mobile development in a practical manner.
Stars: ✭ 547 (+659.72%)
Cve 2017 11882CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.
Stars: ✭ 280 (+288.89%)
Penetration testing poc渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Stars: ✭ 3,858 (+5258.33%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+1506.94%)
Ossf Cve BenchmarkThe OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebases using a variety of static analysis security testing (SAST) tools and generate reports to evaluate those tools.
Stars: ✭ 71 (-1.39%)
CtfSome of my CTF solutions
Stars: ✭ 70 (-2.78%)
UnlockdownDisabling kernel lockdown on Ubuntu without physical access
Stars: ✭ 62 (-13.89%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+12373.61%)
Wasabi AegYet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.
Stars: ✭ 23 (-68.06%)
Vulscanvulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Stars: ✭ 486 (+575%)
ZscOWASP ZSC - Shellcode/Obfuscate Code Generator
Stars: ✭ 536 (+644.44%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+1068.06%)
Commodity Injection SignaturesCommodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT
Stars: ✭ 267 (+270.83%)
A2svAuto Scanning to SSL Vulnerability
Stars: ✭ 524 (+627.78%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (+272.22%)
Pythempentest framework
Stars: ✭ 1,060 (+1372.22%)
Awesome AppsecA curated list of resources for learning about application security
Stars: ✭ 4,761 (+6512.5%)
Cve 2020 10199 cve 2020 10204CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.
Stars: ✭ 20 (-72.22%)
ClusterfuzzScalable fuzzing infrastructure.
Stars: ✭ 4,648 (+6355.56%)
BackdorosbackdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL etc.
Stars: ✭ 50 (-30.56%)