Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (+177.69%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+6503.85%)
GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+3128.46%)
Exploit Cve 2016 10033PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container
Stars: ✭ 356 (+173.85%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-6.15%)
Gitlab rceRCE for old gitlab version <= 11.4.7 & 12.4.0-12.8.1 and LFI for old gitlab versions 10.4 - 12.8.1
Stars: ✭ 104 (-20%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+676.15%)
MpsThe Memory Pool System
Stars: ✭ 351 (+170%)
SirepratRemote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)
Stars: ✭ 326 (+150.77%)
Prestashop Cve 2018 19126PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)
Stars: ✭ 37 (-71.54%)
MeshA memory allocator that automatically reduces the memory footprint of C/C++ applications.
Stars: ✭ 1,243 (+856.15%)
Exploit Cve 2016 9920Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container
Stars: ✭ 34 (-73.85%)
Windows kernel resourcesPapers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits
Stars: ✭ 298 (+129.23%)
TegrarcmguiC++ GUI for TegraRcmSmash (Fusée Gelée exploit for Nintendo Switch)
Stars: ✭ 965 (+642.31%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (+127.69%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-37.69%)
Nova PermissionA Laravel Nova tool for Spatie's laravel-permission library
Stars: ✭ 294 (+126.15%)
Monod📓 Our cool, secure, and offline-first Markdown editor.
Stars: ✭ 880 (+576.92%)
FrankensteinBroadcom and Cypress firmware emulation for fuzzing and further full-stack debugging
Stars: ✭ 285 (+119.23%)
Cve 2017 11882CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.
Stars: ✭ 280 (+115.38%)
Lunik TorrentWeb torrent downloader and cloud storage.
Stars: ✭ 79 (-39.23%)
ProvisioningKubernetes cluster provisioning using Terraform.
Stars: ✭ 277 (+113.08%)
Golang TlsSimple Golang HTTPS/TLS Examples
Stars: ✭ 857 (+559.23%)
Data Structures AlgorithmsMy implementation of 85+ popular data structures and algorithms and interview questions in Python 3 and C++
Stars: ✭ 273 (+110%)
LibmemoryEmbedded systems memory management library. Implementations for malloc(), free(), and other useful memory management functions
Stars: ✭ 102 (-21.54%)
Cve 2019 1003000 Jenkins Rce PocJenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Stars: ✭ 270 (+107.69%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+551.54%)
Commodity Injection SignaturesCommodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT
Stars: ✭ 267 (+105.38%)
CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (-39.23%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (+101.54%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+546.92%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+102.31%)
Blueborne ScannerBluetooth scanner for local devices that may be vulnerable to Blueborne exploit
Stars: ✭ 125 (-3.85%)
StringsareevilReducing memory allocations from 7.5GB to 32KB
Stars: ✭ 260 (+100%)
SrallocMemory allocators
Stars: ✭ 25 (-80.77%)
ConeCone Programming Language
Stars: ✭ 257 (+97.69%)
UnauthdA local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Stars: ✭ 79 (-39.23%)
FlameCordPatch for Waterfall to improve performance during attacks and fix memory issues.
Stars: ✭ 103 (-20.77%)
PegaswitchPegaSwitch is an exploit toolkit for the Nintendo Switch
Stars: ✭ 922 (+609.23%)
micro-MVCAn agile, small, productive and robust MVC framework for PHP with high-quality JS extensions and integrated AJAX support.
Stars: ✭ 33 (-74.62%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-22.31%)
letheSecure drive wipe
Stars: ✭ 47 (-63.85%)
Wasabi AegYet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.
Stars: ✭ 23 (-82.31%)
Nuxt MemwatchQuickly watch real-time memory stats of your nuxt app
Stars: ✭ 76 (-41.54%)
KissmeKissme: Kotlin Secure Storage Multiplatform
Stars: ✭ 351 (+170%)
CryptocatSecure chat software for your computer.
Stars: ✭ 1,011 (+677.69%)
Cve 2019 07083389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (+169.23%)
Cve 2018 18852CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
Stars: ✭ 42 (-67.69%)
SinsofmemoryleaksSome common patterns of memory leaks in Android development and how to fix/avoid them
Stars: ✭ 343 (+163.85%)
LabsVulnerability Labs for security analysis
Stars: ✭ 1,002 (+670.77%)