HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+267.66%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+126.35%)
OseeCollection of things made during my preparation to take on OSEE
Stars: ✭ 69 (-58.68%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+370.66%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-48.5%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+656.89%)
Mecfor mass exploiting
Stars: ✭ 448 (+168.26%)
Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (-33.53%)
Android ExploitsA collection of android Exploits and Hacks
Stars: ✭ 290 (+73.65%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+542.51%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+394.61%)
cyber-securityCybersecurity stuff for both the blue team and the red team, mostly red though.
Stars: ✭ 34 (-79.64%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+6158.08%)
IsfISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
Stars: ✭ 690 (+313.17%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-20.96%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-51.5%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (-7.78%)
ExploitsA handy collection of my public exploits, all in one place.
Stars: ✭ 342 (+104.79%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+592.81%)
Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+1774.85%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+5807.78%)
exploitJust some exploits :P
Stars: ✭ 38 (-77.25%)
Kernelhub🌴Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file
Stars: ✭ 972 (+482.04%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+424.55%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-49.7%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+688.02%)
PompemFind exploit tool
Stars: ✭ 786 (+370.66%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+335.93%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-46.71%)
Kernelpopkernel privilege escalation enumeration and exploitation framework
Stars: ✭ 628 (+276.05%)
Go ShodanShodan API client
Stars: ✭ 158 (-5.39%)
RouterosRouterOS Security Research Tooling and Proof of Concepts
Stars: ✭ 603 (+261.08%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-51.5%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+183.83%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-31.74%)
RoothelperA Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.
Stars: ✭ 416 (+149.1%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-56.89%)
EqgrpDecrypted content of eqgrp-auction-file.tar.xz
Stars: ✭ 3,743 (+2141.32%)
ExploitsContaining Self Made Perl Reproducers / PoC Codes
Stars: ✭ 160 (-4.19%)
PocAdvisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (+125.15%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+594.61%)
ApiVulners Python API wrapper
Stars: ✭ 313 (+87.43%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-39.52%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (+69.46%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-59.88%)
CVE-StockpileMaster list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
Stars: ✭ 41 (-75.45%)
0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (-10.78%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-68.26%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-77.84%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-41.32%)
ExploitrainingsExploitation on different architectures (x86, x64, arm, mips, avr)
Stars: ✭ 29 (-82.63%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (-4.79%)
Exploit Framework🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (-13.77%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+704.19%)