Cve 2020 0688 expCVE-2020-0688_EXP Auto trigger payload & encrypt method
Stars: ✭ 134 (-15.72%)
Exploit Framework🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (-9.43%)
Ddos RootsecDDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-32.08%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (+637.74%)
Webrtc LeakCheck if your VPN leaks your IP address via the WebRTC technology
Stars: ✭ 133 (-16.35%)
OseeCollection of things made during my preparation to take on OSEE
Stars: ✭ 69 (-56.6%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-33.96%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+627.67%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-3.77%)
Poc BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 68 (-57.23%)
Gdb StaticPublic repository of static GDB and GDBServer
Stars: ✭ 103 (-35.22%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-60.38%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-20.13%)
UnlockdownDisabling kernel lockdown on Ubuntu without physical access
Stars: ✭ 62 (-61.01%)
MtpwnPoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
Stars: ✭ 143 (-10.06%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-75.47%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+578.62%)
Cve 2019 1458CVE-2019-1458 Windows LPE Exploit
Stars: ✭ 101 (-36.48%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+574.84%)
PhonesploitA tool for remote ADB exploitation in Python3 for all Machines.
Stars: ✭ 122 (-23.27%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-67.92%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+6105.03%)
Twitter Follow ExploitAutomated Twitter mass account creation and follow using Selenium and Tor VPN
Stars: ✭ 47 (-70.44%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-44.03%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-76.73%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-69.81%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+7111.32%)
IcememeRoblox Exploit Source Code Called IceMeme with some cmds, lua c and limited lua execution with simple ui in c#
Stars: ✭ 42 (-73.58%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+721.38%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-10.06%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+523.9%)
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-42.77%)
Search LibcWeb wrapper of niklasb/libc-database
Stars: ✭ 124 (-22.01%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-44.03%)
Prestashop Cve 2018 19126PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)
Stars: ✭ 37 (-76.73%)
Exploit Cve 2016 9920Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container
Stars: ✭ 34 (-78.62%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (+508.81%)
0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (-6.29%)
JexbossJexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
Stars: ✭ 2,008 (+1162.89%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-22.01%)
TegrarcmguiC++ GUI for TegraRcmSmash (Fusée Gelée exploit for Nintendo Switch)
Stars: ✭ 965 (+506.92%)
ExploitrainingsExploitation on different architectures (x86, x64, arm, mips, avr)
Stars: ✭ 29 (-81.76%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+705.66%)
Cve 2017 0065Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-90.57%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-23.27%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-45.28%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+437.11%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+432.7%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+428.93%)