Advanced Algorithms100+ algorithms & data structures generically implemented in C#.
Stars: ✭ 752 (+324.86%)
goMS17-010Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
Stars: ✭ 67 (-62.15%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-28.25%)
HtshellsSelf contained htaccess shells and attacks
Stars: ✭ 708 (+300%)
SpringBootExploit项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
Stars: ✭ 1,060 (+498.87%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-50.85%)
Spectre AttackExample of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Stars: ✭ 690 (+289.83%)
goelftoolsLibrary for parsing ELF files written in pure Go.
Stars: ✭ 26 (-85.31%)
Algo TreeAlgo-Tree is a collection of Algorithms and data structures which are fundamentals to efficient code and good software design. Creating and designing excellent algorithms is required for being an exemplary programmer. It contains solutions in various languages such as C++, Python and Java.
Stars: ✭ 166 (-6.21%)
ronin-exploitsA Ruby micro-framework for writing and running exploits
Stars: ✭ 36 (-79.66%)
RrRecord and Replay Framework
Stars: ✭ 6,469 (+3554.8%)
Pool2020💼 Pools organized for Epitech's students in 2020.
Stars: ✭ 14 (-92.09%)
gdb-rubyIt's time for Ruby lovers to use Ruby in gdb, and gdb in Ruby!
Stars: ✭ 55 (-68.93%)
JoomscanOWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+261.58%)
treapA thread-safe, persistent Treap (tree + heap) for ordered key-value mapping and priority sorting.
Stars: ✭ 23 (-87.01%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-28.81%)
Umbraco-RCEUmbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
Stars: ✭ 61 (-65.54%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+246.89%)
gdb 2 rootThis python script adds some usefull command to stripped vmlinux image
Stars: ✭ 20 (-88.7%)
Ctf Pwn TipsHere record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.
Stars: ✭ 1,249 (+605.65%)
BinV👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.
Stars: ✭ 25 (-85.88%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+246.89%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-89.27%)
LagmonitorMonitor performance of your Minecraft server. Similar to VisualVM and Java Mission Control.
Stars: ✭ 147 (-16.95%)
discord-bugs-exploitsA Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-87.57%)
Rop ToolA tool to help you write binary exploits
Stars: ✭ 590 (+233.33%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-53.67%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-73.45%)
Ctf WriteupsCollection of scripts and writeups
Stars: ✭ 266 (+50.28%)
minimal gdb🐛 Lightweight vim -> gdb broker which uses .gdbinit gdb config file to export breakpoints
Stars: ✭ 16 (-90.96%)
padreBlazing fast, advanced Padding Oracle exploit
Stars: ✭ 35 (-80.23%)
Blueborne ScannerBluetooth scanner for local devices that may be vulnerable to Blueborne exploit
Stars: ✭ 125 (-29.38%)
Data-StructuresAlgorithmic Problems Solutions -- hash table code featured in geeksforgeeks
Stars: ✭ 44 (-75.14%)
RootMyTV.github.ioRootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.
Stars: ✭ 745 (+320.9%)
kakoune-gdbgdb integration plugin
Stars: ✭ 44 (-75.14%)
Android interviews🚀Everything you need to know to find a android job. 算法 / 面试题 / Android 知识点 🔥🔥🔥 总结不易,你的 star 是我最大的动力!
Stars: ✭ 510 (+188.14%)
winpwnCTF windows pwntools
Stars: ✭ 137 (-22.6%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+1202.26%)
ExploitsA personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
Stars: ✭ 75 (-57.63%)
AlgorithmsCLRS study. Codes are written with golang.
Stars: ✭ 482 (+172.32%)
CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (-55.37%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+167.8%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-29.94%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-72.88%)
Docker EyeosRun iPhone (xnu-arm64) in a Docker container! Supports KVM + iOS kernel debugging (GDB)! Run xnu-qemu-arm64 in Docker! Works on ANY device.
Stars: ✭ 256 (+44.63%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+48.59%)
ShellverReverse Shell Cheat Sheet TooL
Stars: ✭ 258 (+45.76%)
Pwn repoTo store some CTF_pwn_bins and exploits for self-practice
Stars: ✭ 256 (+44.63%)
PocProofs-of-concept
Stars: ✭ 467 (+163.84%)
Docker Clion DevDebugging C++ in a Docker Container with CLion IDE
Stars: ✭ 172 (-2.82%)
Ctfsome experience in CTFs
Stars: ✭ 165 (-6.78%)