Pythempentest framework
Stars: ✭ 1,060 (-18.84%)
CiscoexploitCisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)
Stars: ✭ 73 (-94.41%)
Twitter Follow ExploitAutomated Twitter mass account creation and follow using Selenium and Tor VPN
Stars: ✭ 47 (-96.4%)
Binary ExploitationGood to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-96.4%)
F00dactually first public f00d hack, enjoy
Stars: ✭ 72 (-94.49%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-96.4%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-96.32%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-93.34%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-93.72%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-94.49%)
Labs PentestFree Labs to Train Your Pentest / CTF Skills
Stars: ✭ 46 (-96.48%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (-10.18%)
CtfCTF writeups
Stars: ✭ 45 (-96.55%)
PwnablewebPwnableWeb is a suite of web applications for use in information security training.
Stars: ✭ 81 (-93.8%)
Rocket ShotBackwards program slice stitching for automatic CTF problem solving.
Stars: ✭ 43 (-96.71%)
Ctfclictfcli is a tool to manage Capture The Flag events and challenges
Stars: ✭ 43 (-96.71%)
PrintfTiny, fast, non-dependent and fully loaded printf implementation for embedded systems. Extensive test suite passing.
Stars: ✭ 1,157 (-11.41%)
IcememeRoblox Exploit Source Code Called IceMeme with some cmds, lua c and limited lua execution with simple ui in c#
Stars: ✭ 42 (-96.78%)
Cve 2018 18852CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
Stars: ✭ 42 (-96.78%)
LabsVulnerability Labs for security analysis
Stars: ✭ 1,002 (-23.28%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (-24.04%)
Poc BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 68 (-94.79%)
CryptonLibrary consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Stars: ✭ 995 (-23.81%)
Offport killerThis tool aims at automating the identification of potential service running behind ports identified manually either through manual scan or services running locally. The tool is useful when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running behind the identified ports.
Stars: ✭ 40 (-96.94%)
VenomVenom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (-5.97%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-94.79%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-97.01%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-97.17%)
Prestashop Cve 2018 19126PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)
Stars: ✭ 37 (-97.17%)
ZekeA POSIX-like OS for ARM processors.
Stars: ✭ 79 (-93.95%)
CtfCTF Field Guide
Stars: ✭ 1,145 (-12.33%)
Tiny Xss PayloadsA collection of tiny XSS Payloads that can be used in different contexts. https://tinyxss.terjanq.me
Stars: ✭ 975 (-25.34%)
Exploit Cve 2016 9920Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container
Stars: ✭ 34 (-97.4%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (-25.88%)
TegrarcmguiC++ GUI for TegraRcmSmash (Fusée Gelée exploit for Nintendo Switch)
Stars: ✭ 965 (-26.11%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-95.02%)
Docker WarDocker based Wargame Platform - To practice your CTF skills
Stars: ✭ 30 (-97.7%)
Fast iofast_io is a C++ general-purpose exception-safe RAII I/O library based on C++ 20 Concepts. It is at least ten times faster than cstdio or iostream.
Stars: ✭ 1,124 (-13.94%)
Ctf(mostly web related) web challenge writeups between 2011 and 2015
Stars: ✭ 20 (-98.47%)
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-93.03%)
FlowerTCP flow analyzer with sugar for A/D CTF
Stars: ✭ 88 (-93.26%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-93.34%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (-32.16%)
Cve 2017 0065Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-98.85%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (-32.92%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-95.18%)
Defcon 2018DEFCON 2018 Qualification writeups
Stars: ✭ 12 (-99.08%)
ToolchainC/C++ toolchain for MiniOS
Stars: ✭ 11 (-99.16%)