LightCosmosRatA remote administration tool for Windows, written in C#
Stars: ✭ 31 (-86.22%)
BoomERFramework for exploiting local vulnerabilities
Stars: ✭ 84 (-62.67%)
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
Stars: ✭ 69 (-69.33%)
dirtycowradare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
Stars: ✭ 93 (-58.67%)
xss-http-injectorXSS HTTP Inject0r is a proof of concept tool that shows how XSS (Cross Site Scripting) flags can be exploited easily. It is written in HTML + Javascript + PHP and released under GPLv3.
Stars: ✭ 22 (-90.22%)
readhookRed-team tool to hook libc read syscall with a buffer overflow vulnerability.
Stars: ✭ 31 (-86.22%)
HTPHack The Printer
Stars: ✭ 31 (-86.22%)
CVE-2021-22205GitLab CE/EE Preauth RCE using ExifTool
Stars: ✭ 165 (-26.67%)
overflowA command-line tool for exploiting stack-based buffer overflow vulnerabilities.
Stars: ✭ 66 (-70.67%)
break-fast-serialA proof of concept that demonstrates asynchronous scanning for Java deserialization bugs
Stars: ✭ 53 (-76.44%)
shu-shellWebshell Jumping Edition
Stars: ✭ 23 (-89.78%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+759.56%)
getroot🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS
Stars: ✭ 34 (-84.89%)
CVE-2018-2380PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM
Stars: ✭ 55 (-75.56%)
rsGenrsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (-68.44%)
BrahmaBrahma - Privilege elevation exploit for Nintendo 3DS
Stars: ✭ 34 (-84.89%)
purelovePurelove is a lightweight penetration testing framework, in order to better security testers testing holes with use.
Stars: ✭ 52 (-76.89%)
Drupalgeddon3Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-92%)
armroperARM rop chain gadget searcher
Stars: ✭ 36 (-84%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-43.56%)
pysploit-frameworkfree exploit framework written use python language version 3.3
Stars: ✭ 33 (-85.33%)
IAT APIAssembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Stars: ✭ 63 (-72%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-36.89%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-37.78%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (-60.44%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (-76.89%)
XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+8%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+7.56%)
SpectrepocProof of concept code for the Spectre CPU exploit.
Stars: ✭ 239 (+6.22%)
Awesome Vm Exploit share some useful archives about vm and qemu escape exploit.
Stars: ✭ 239 (+6.22%)
KillshotA Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
Stars: ✭ 237 (+5.33%)
H Encore 2Fully chained kernel exploit for the PS Vita on firmwares 3.65-3.73
Stars: ✭ 237 (+5.33%)
DccwbypassuacWindows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
Stars: ✭ 227 (+0.89%)
Lost Nds TvThe Lost Nintendo DS Television Output, brought back to life
Stars: ✭ 221 (-1.78%)