hsploitAn advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-80.95%)
exploitsSome of my public exploits
Stars: ✭ 50 (-40.48%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-46.43%)
byteripperA tool to extract code from individual functions in a library.
Stars: ✭ 14 (-83.33%)
AmberReflective PE packer.
Stars: ✭ 594 (+607.14%)
dwexDWARF Explorer - a GUI utility for navigating the DWARF debug information
Stars: ✭ 58 (-30.95%)
PayloadsGit All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+3307.14%)
FilebytesLibrary to read and edit files in the following formats: Executable and Linking Format (ELF), Portable Executable (PE), MachO and OAT (Android Runtime)
Stars: ✭ 105 (+25%)
GoblinAn impish, cross-platform binary parsing crate, written in Rust
Stars: ✭ 591 (+603.57%)
lookpathThe minimum and most straightforward way to check if command exists and where the executable is, without spawning child_process.
Stars: ✭ 49 (-41.67%)
xbedumpTool to dump header information or sign original Xbox executables
Stars: ✭ 18 (-78.57%)
Defeat-Defender-V1.2Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+953.57%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+248.81%)
you-get.exeYou-Get unofficial build executable for Windows || You-Get 非官方构建的可执行文件
Stars: ✭ 40 (-52.38%)
ManalyzeA static analyzer for PE executables.
Stars: ✭ 701 (+734.52%)
ElfparserCross Platform ELF analysis
Stars: ✭ 228 (+171.43%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (+44.05%)
ZelosA comprehensive binary emulation and instrumentation platform.
Stars: ✭ 298 (+254.76%)
Cave minerSearch for code cave in all binaries
Stars: ✭ 218 (+159.52%)
Nexe🎉 create a single executable out of your node.js apps
Stars: ✭ 10,565 (+12477.38%)
Bingreplike ~~grep~~ UBER, but for binaries
Stars: ✭ 1,395 (+1560.71%)
evilMACHOMalicious use of macho, such as dump-runtime-macho, function-hook.
Stars: ✭ 13 (-84.52%)
Narnode.js application archive - create self-contained binary like executable applications that are ready to ship and run
Stars: ✭ 428 (+409.52%)
Pwn2exploitall mine papers, pwn & exploit
Stars: ✭ 289 (+244.05%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+213.1%)
monetaMoneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+357.14%)
CamOverCamOver is a camera exploitation tool that allows to disclosure network camera admin password.
Stars: ✭ 217 (+158.33%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-55.95%)
TegrarcmguiC++ GUI for TegraRcmSmash (Fusée Gelée exploit for Nintendo Switch)
Stars: ✭ 965 (+1048.81%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (+3.57%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+942.86%)
gocaveFinding code caves in ELF files with GoLang
Stars: ✭ 22 (-73.81%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+1523.81%)
get-bin-pathGet the current package's binary path
Stars: ✭ 25 (-70.24%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+630.95%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (+89.29%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+121.43%)
wasm-joeyServerless Wasm - A lightweight Node.js application for deploying and executing WebAssembly(Wasm) binary-code via HTTP
Stars: ✭ 48 (-42.86%)
IAT APIAssembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Stars: ✭ 63 (-25%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+66.67%)
Loki.RatLoki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Remote Access Tool.
Stars: ✭ 63 (-25%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+464.29%)
OrcaAdvanced Malware with multifeatures written in ASM/C/C++ , work on all windows versions ! (uncompleted)
Stars: ✭ 184 (+119.05%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+45.24%)
pe-loaderA Windows PE format file loader
Stars: ✭ 81 (-3.57%)
Fe2O3Simple prepender virus written in Rust
Stars: ✭ 84 (+0%)
wownedAuthentication bypass for outdated WoW emulation authentication servers
Stars: ✭ 32 (-61.9%)
upxNode.js cross-platform wrapper for UPX - the ultimate packer for eXecutables.
Stars: ✭ 27 (-67.86%)
ShadowStealPure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Stars: ✭ 186 (+121.43%)
Anti-Debug-DBAnti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommendations of how to mitigate the each trick.
Stars: ✭ 20 (-76.19%)
goMS17-010Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
Stars: ✭ 67 (-20.24%)
Umbraco-RCEUmbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
Stars: ✭ 61 (-27.38%)
BinarifyConvert Images to Binary Art!
Stars: ✭ 15 (-82.14%)