readhookRed-team tool to hook libc read syscall with a buffer overflow vulnerability.
Stars: ✭ 31 (+34.78%)
persesLanguage-agnostic program reducer.
Stars: ✭ 57 (+147.83%)
dataloggerDataLogger foi projetado para ser uma biblioteca simples de log com suporte a vários providers.
Stars: ✭ 46 (+100%)
getroot🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS
Stars: ✭ 34 (+47.83%)
backtrace-unityFirst-class error reporting for the Unity game engine.
Stars: ✭ 99 (+330.43%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+452.17%)
overflowA command-line tool for exploiting stack-based buffer overflow vulnerabilities.
Stars: ✭ 66 (+186.96%)
SpectrepocProof of concept code for the Spectre CPU exploit.
Stars: ✭ 239 (+939.13%)
SWELFSimple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (+0%)
evtxC# based evtx parser with lots of extras
Stars: ✭ 162 (+604.35%)
rsGenrsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (+208.7%)
XLog一个简易的日志打印框架(支持打印策略自定义,默认提供2种策略:logcat打印和磁盘打印)
Stars: ✭ 33 (+43.48%)
Drupalgeddon3Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-21.74%)
xss-http-injectorXSS HTTP Inject0r is a proof of concept tool that shows how XSS (Cross Site Scripting) flags can be exploited easily. It is written in HTML + Javascript + PHP and released under GPLv3.
Stars: ✭ 22 (-4.35%)
IAT APIAssembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Stars: ✭ 63 (+173.91%)
kernelpwnkernel-pwn and writeup collection
Stars: ✭ 348 (+1413.04%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+286.96%)
CVE-2021-22205GitLab CE/EE Preauth RCE using ExifTool
Stars: ✭ 165 (+617.39%)
XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+956.52%)
LightCosmosRatA remote administration tool for Windows, written in C#
Stars: ✭ 31 (+34.78%)
break-fast-serialA proof of concept that demonstrates asynchronous scanning for Java deserialization bugs
Stars: ✭ 53 (+130.43%)
KillshotA Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
Stars: ✭ 237 (+930.43%)
DccwbypassuacWindows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
Stars: ✭ 227 (+886.96%)
shu-shellWebshell Jumping Edition
Stars: ✭ 23 (+0%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+8308.7%)
exploitsSome of my public exploits
Stars: ✭ 50 (+117.39%)
CVE-2018-2380PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM
Stars: ✭ 55 (+139.13%)
BrahmaBrahma - Privilege elevation exploit for Nintendo 3DS
Stars: ✭ 34 (+47.83%)
PatrowlHearsDataOpen-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
Stars: ✭ 66 (+186.96%)
purelovePurelove is a lightweight penetration testing framework, in order to better security testers testing holes with use.
Stars: ✭ 52 (+126.09%)
dirtycowradare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
Stars: ✭ 93 (+304.35%)
armroperARM rop chain gadget searcher
Stars: ✭ 36 (+56.52%)
kahoot-toolsA website for interacting with kahoot games.
Stars: ✭ 63 (+173.91%)
pysploit-frameworkfree exploit framework written use python language version 3.3
Stars: ✭ 33 (+43.48%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+517.39%)
exynos-usbdlUnsigned code loader for Exynos BootROM
Stars: ✭ 57 (+147.83%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+508.7%)
HTPHack The Printer
Stars: ✭ 31 (+34.78%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (+126.09%)
PoC-BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 83 (+260.87%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+952.17%)
Discord-Console-hacksA collection of JavaScript Codes I've made to enhance the User Experience of Discord and some other Discord related stuff
Stars: ✭ 353 (+1434.78%)
Awesome Vm Exploit share some useful archives about vm and qemu escape exploit.
Stars: ✭ 239 (+939.13%)
bugsnag-javaBugsnag error reporting for Java.
Stars: ✭ 51 (+121.74%)
H Encore 2Fully chained kernel exploit for the PS Vita on firmwares 3.65-3.73
Stars: ✭ 237 (+930.43%)
BoomERFramework for exploiting local vulnerabilities
Stars: ✭ 84 (+265.22%)
Lost Nds TvThe Lost Nintendo DS Television Output, brought back to life
Stars: ✭ 221 (+860.87%)
EOS-Proxy-TokenProxy token to allow mitigating EOSIO Ram exploit
Stars: ✭ 22 (-4.35%)
LGTVCompanionPower On and Off WebOS LG TVs together with your PC
Stars: ✭ 420 (+1726.09%)
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
Stars: ✭ 69 (+200%)