AndroratAndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (-37.5%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-76.65%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-76.1%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-73.53%)
XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (-55.33%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-93.2%)
Ciscorv320dumpCVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!
Stars: ✭ 198 (-63.6%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-96.51%)
Heap ViewerAn IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+5.51%)
exploitsSome of my public exploits
Stars: ✭ 50 (-90.81%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (+6.8%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+0%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+64.89%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+727.21%)
Cve 2019 9810Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Stars: ✭ 200 (-63.24%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (-77.57%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+12.87%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+46.88%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-91.73%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+61.03%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (-83.64%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-74.26%)
Antimalware ResearchResearch on Anti-malware and other related security solutions
Stars: ✭ 163 (-70.04%)
SubRosaBasic tool to automate backdooring PE files
Stars: ✭ 48 (-91.18%)
PythonPython Powered Repository
Stars: ✭ 17 (-96.87%)
spellbookFramework for rapid development and reusable of security tools
Stars: ✭ 67 (-87.68%)
RageRage allows you to execute any file in a Microsoft Office document.
Stars: ✭ 68 (-87.5%)
RootMyTV.github.ioRootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.
Stars: ✭ 745 (+36.95%)
exploitMy exploitDB.
Stars: ✭ 16 (-97.06%)
wownedAuthentication bypass for outdated WoW emulation authentication servers
Stars: ✭ 32 (-94.12%)
pluGET📦 Powerful Package manager which updates plugins & server software for minecraft servers
Stars: ✭ 87 (-84.01%)
exploitCollection of different exploits
Stars: ✭ 153 (-71.87%)
CVE-2016-7255An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Stars: ✭ 85 (-84.37%)
XRadarViewA highly customizable radar view for Android
Stars: ✭ 106 (-80.51%)
CVE-2019-10149CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Stars: ✭ 15 (-97.24%)
Umbraco-RCEUmbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
Stars: ✭ 61 (-88.79%)
ExploitsA personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
Stars: ✭ 75 (-86.21%)
Scripts-SploitsA number of scripts POC's and problems solved as pentests move along.
Stars: ✭ 37 (-93.2%)
doonaNetwork based protocol fuzzer
Stars: ✭ 64 (-88.24%)
phuzzFind exploitable PHP files by parameter fuzzing and function call tracing
Stars: ✭ 53 (-90.26%)
roprA blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative
Stars: ✭ 200 (-63.24%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-86.21%)
apple-knowledgeA collection of reverse engineered Apple things, as well as a machine-readable database of Apple hardware
Stars: ✭ 338 (-37.87%)
ars 40XDriver for the Continental radar ARS_404 / ARS_408.
Stars: ✭ 55 (-89.89%)
x64dbgpylibPort of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.
Stars: ✭ 46 (-91.54%)
CTFCTF binary exploit code
Stars: ✭ 37 (-93.2%)
CamRaptorCamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (-80.51%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-93.01%)
DrGadgetdr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (-88.79%)