Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-18.06%)
AnsvifA Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.
Stars: ✭ 107 (-30.97%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-59.35%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-7.74%)
UnlockdownDisabling kernel lockdown on Ubuntu without physical access
Stars: ✭ 62 (-60%)
Gitlab rceRCE for old gitlab version <= 11.4.7 & 12.4.0-12.8.1 and LFI for old gitlab versions 10.4 - 12.8.1
Stars: ✭ 104 (-32.9%)
Sap exploitHere you can get full exploit for SAP NetWeaver AS JAVA
Stars: ✭ 60 (-61.29%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-18.06%)
WebviewTiny cross-platform webview library for C/C++/Golang. Uses WebKit (Gtk/Cocoa) and Edge (Windows)
Stars: ✭ 9,200 (+5835.48%)
NtrghidraFully Featured Nintendo DS Loader for Ghidra
Stars: ✭ 56 (-63.87%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-5.81%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-67.1%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-34.84%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-18.71%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-69.68%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+780%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-70.97%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+5438.71%)
OdysseusBridging the elementary OS and Web user experiences
Stars: ✭ 41 (-73.55%)
Blueborne ScannerBluetooth scanner for local devices that may be vulnerable to Blueborne exploit
Stars: ✭ 125 (-19.35%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+540%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+6642.58%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-5.16%)
Prestashop Cve 2018 19126PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)
Stars: ✭ 37 (-76.13%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-42.58%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (+524.52%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-20%)
Cve 2017 0065Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-90.32%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+726.45%)
Webrtc LeakCheck if your VPN leaks your IP address via the WebRTC technology
Stars: ✭ 133 (-14.19%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+446.45%)
UzblA web browser that adheres to the unix philosophy.
Stars: ✭ 938 (+505.16%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-21.29%)
PegaswitchPegaSwitch is an exploit toolkit for the Nintendo Switch
Stars: ✭ 922 (+494.84%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-43.87%)
Wasabi AegYet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.
Stars: ✭ 23 (-85.16%)
MtpwnPoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
Stars: ✭ 143 (-7.74%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+478.71%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-47.1%)
MacsvgmacSVG - An open-source macOS app for designing HTML5 SVG (Scalable Vector Graphics) art and animation with a WebKit web view ➤➤➤
Stars: ✭ 789 (+409.03%)
SafilerSafari local file reader
Stars: ✭ 118 (-23.87%)
MultiCreate a custom, lightweight macOS app from a group of websites
Stars: ✭ 755 (+387.1%)
CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (-49.03%)
HtshellsSelf contained htaccess shells and attacks
Stars: ✭ 708 (+356.77%)
MailMail app designed for elementary OS
Stars: ✭ 130 (-16.13%)
UnauthdA local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Stars: ✭ 79 (-49.03%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-1.29%)
AdiumOfficial mirror of hg.adium.im
Stars: ✭ 146 (-5.81%)
SvscannerSVScanner - Scanner Vulnerability And MaSsive Exploit.
Stars: ✭ 143 (-7.74%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-16.13%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-26.45%)
CiscoexploitCisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)
Stars: ✭ 73 (-52.9%)