Cve 2017 0781Blueborne CVE-2017-0781 Android heap overflow vulnerability
Stars: ✭ 74 (-43.08%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+5863.08%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+949.23%)
external-protocol-floodingScheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Stars: ✭ 603 (+363.85%)
Advanced Algorithms100+ algorithms & data structures generically implemented in C#.
Stars: ✭ 752 (+478.46%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-44.62%)
All-Discord-ExploitsThis is a list of Discord console scripts, bugs and exploits.
Stars: ✭ 34 (-73.85%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+460%)
dawgmondawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
Stars: ✭ 52 (-60%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-2.31%)
destiny-macrosA collection of Destiny 2 macros built with AutoHotKey
Stars: ✭ 24 (-81.54%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+446.15%)
log4j2-rce-exploitlog4j2 remote code execution or IP leakage exploit (with examples)
Stars: ✭ 62 (-52.31%)
AutomemC++-style automatic memory management smart pointers for D
Stars: ✭ 71 (-45.38%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-73.08%)
K8cscanK8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
Stars: ✭ 693 (+433.08%)
KissmeKissme: Kotlin Secure Storage Multiplatform
Stars: ✭ 351 (+170%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-24.62%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (-51.54%)
DSAData Structures and Algorithms
Stars: ✭ 13 (-90%)
CtfSome of my CTF solutions
Stars: ✭ 70 (-46.15%)
jheapsMaster repository for the JHeaps project
Stars: ✭ 34 (-73.85%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (+417.69%)
nestedA memory efficient container for rust nested collections
Stars: ✭ 28 (-78.46%)
Postmate📭 A powerful, simple, promise-based postMessage library.
Stars: ✭ 1,638 (+1160%)
MS17010EXPLadon Moudle MS17010 Exploit for PowerShell
Stars: ✭ 40 (-69.23%)
Heap allocatorA simple heap memory allocator in ~200 lines.
Stars: ✭ 661 (+408.46%)
Secure IfAndroid USB Control app
Stars: ✭ 68 (-47.69%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-35.38%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+372.31%)
macos-receiverA MacOS TabBar (StatusBar) application that securely receives one-time passwords (OTPs) that you tapped in Raivo for iOS.
Stars: ✭ 44 (-66.15%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+933.08%)
CVE-2021-33766ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
Stars: ✭ 37 (-71.54%)
CryptocatSecure chat software for your computer.
Stars: ✭ 1,011 (+677.69%)
Cve 2019 07083389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (+169.23%)
pasthisSimple stupid pastebin
Stars: ✭ 36 (-72.31%)
Poc BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 68 (-47.69%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-49.23%)
Articles Translator📚Translate the distinct technical blogs. Please star or watch. Welcome to join me.
Stars: ✭ 606 (+366.15%)
ShadowStealPure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Stars: ✭ 186 (+43.08%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-3.85%)
AEGPaperAutomatic Exploit Generation Paper
Stars: ✭ 30 (-76.92%)
Koa HelmetImportant security headers for koa
Stars: ✭ 595 (+357.69%)
winallenumThis powershell script has got to run in remote hacked windows host, even for pivoting
Stars: ✭ 13 (-90%)
Weakable SelfA Swift micro-framework to easily deal with weak references to self inside closures
Stars: ✭ 64 (-50.77%)
evilMACHOMalicious use of macho, such as dump-runtime-macho, function-hook.
Stars: ✭ 13 (-90%)
Rop ToolA tool to help you write binary exploits
Stars: ✭ 590 (+353.85%)
BughunterTools for Bug Hunting
Stars: ✭ 95 (-26.92%)
Cve 2018 18852CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
Stars: ✭ 42 (-67.69%)
SinsofmemoryleaksSome common patterns of memory leaks in Android development and how to fix/avoid them
Stars: ✭ 343 (+163.85%)
LabsVulnerability Labs for security analysis
Stars: ✭ 1,002 (+670.77%)
Sqli HunterSQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
Stars: ✭ 340 (+161.54%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-33.08%)