WesngWindows Exploit Suggester - Next Generation
Stars: ✭ 2,675 (+3953.03%)
ronin-exploitsA Ruby micro-framework for writing and running exploits
Stars: ✭ 36 (-45.45%)
RageRage allows you to execute any file in a Microsoft Office document.
Stars: ✭ 68 (+3.03%)
lunasecLunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Stars: ✭ 1,261 (+1810.61%)
Umbraco-RCEUmbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
Stars: ✭ 61 (-7.58%)
CtfSome of my CTF solutions
Stars: ✭ 70 (+6.06%)
x64dbgpylibPort of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.
Stars: ✭ 46 (-30.3%)
IronsquirrelEncrypted exploit delivery for the masses
Stars: ✭ 197 (+198.48%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-71.21%)
Poc BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 68 (+3.03%)
FastPwnCTF中Pwn的快速利用模板(包含awd pwn)
Stars: ✭ 18 (-72.73%)
exploitsSome of my public exploits
Stars: ✭ 50 (-24.24%)
padreBlazing fast, advanced Padding Oracle exploit
Stars: ✭ 35 (-46.97%)
RootMyTV.github.ioRootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.
Stars: ✭ 745 (+1028.79%)
Cve 2014 0038Linux local root exploit for CVE-2014-0038
Stars: ✭ 193 (+192.42%)
Scripts-SploitsA number of scripts POC's and problems solved as pentests move along.
Stars: ✭ 37 (-43.94%)
serverless-snykServerless plugin for securing your dependencies with Snyk
Stars: ✭ 40 (-39.39%)
apple-knowledgeA collection of reverse engineered Apple things, as well as a machine-readable database of Apple hardware
Stars: ✭ 338 (+412.12%)
Cve 2020 0796CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Stars: ✭ 1,102 (+1569.7%)
AndroratAndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+415.15%)
SafilerSafari local file reader
Stars: ✭ 118 (+78.79%)
hackKubernetes security and vulnerability tools and utilities.
Stars: ✭ 56 (-15.15%)
NtrghidraFully Featured Nintendo DS Loader for Ghidra
Stars: ✭ 56 (-15.15%)
ProxyLogonProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)
Stars: ✭ 112 (+69.7%)
shakeitoffWindows MSI Installer LPE (CVE-2021-43883)
Stars: ✭ 68 (+3.03%)
Pythempentest framework
Stars: ✭ 1,060 (+1506.06%)
GtfoSearch gtfobins and lolbas files from your terminal
Stars: ✭ 336 (+409.09%)
ShodanwaveShodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
Stars: ✭ 183 (+177.27%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+84.85%)
Twitter Follow ExploitAutomated Twitter mass account creation and follow using Selenium and Tor VPN
Stars: ✭ 47 (-28.79%)
exploit-CVE-2015-3306ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container
Stars: ✭ 97 (+46.97%)
purelovePurelove is a lightweight penetration testing framework, in order to better security testers testing holes with use.
Stars: ✭ 52 (-21.21%)
expdevVulnerable software and exploits used for OSCP/OSCE preparation
Stars: ✭ 24 (-63.64%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-27.27%)
go-gtfogtfo, now with the speed of golang
Stars: ✭ 59 (-10.61%)
Airdos💣 Remotely render any nearby iPhone or iPad unusable
Stars: ✭ 182 (+175.76%)
IcememeRoblox Exploit Source Code Called IceMeme with some cmds, lua c and limited lua execution with simple ui in c#
Stars: ✭ 42 (-36.36%)
Ultimate-Guitar-HackThe first tool to download any Guitar Pro file, including 'Official' from Ultimate Guitar
Stars: ✭ 61 (-7.58%)
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
Stars: ✭ 69 (+4.55%)
Cve 2018 18852CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
Stars: ✭ 42 (-36.36%)
SpectrepocProof of concept code for the Spectre CPU exploit.
Stars: ✭ 239 (+262.12%)
JsshellAn interactive multi-user web JS shell
Stars: ✭ 330 (+400%)
Cve 2018 7600💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002
Stars: ✭ 330 (+400%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (+393.94%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1403.03%)
EOS-Proxy-TokenProxy token to allow mitigating EOSIO Ram exploit
Stars: ✭ 22 (-66.67%)
dep-scanFully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI and Google CloudBuild. No server required!
Stars: ✭ 346 (+424.24%)
SirepratRemote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)
Stars: ✭ 326 (+393.94%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+2830.3%)
Awesome Vm Exploit share some useful archives about vm and qemu escape exploit.
Stars: ✭ 239 (+262.12%)
ArmpwnRepository to train/learn memory corruption on the ARM platform.
Stars: ✭ 320 (+384.85%)
Ddos RootsecDDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (+63.64%)
Pwn2own2020Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
Stars: ✭ 314 (+375.76%)