devdocs-desktopGTK3 application for DevDocs API documentation browser.
Stars: ✭ 102 (-34.19%)
PoC-BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 83 (-46.45%)
LightCosmosRatA remote administration tool for Windows, written in C#
Stars: ✭ 31 (-80%)
NtrghidraFully Featured Nintendo DS Loader for Ghidra
Stars: ✭ 56 (-63.87%)
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
Stars: ✭ 69 (-55.48%)
HyperpwnA hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
Stars: ✭ 387 (+149.68%)
qt-webkit-kioskThis is simple browser application written on Qt & QtWebkit.
Stars: ✭ 49 (-68.39%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-5.81%)
dirtycowradare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
Stars: ✭ 93 (-40%)
LadongoLadon Pentest Scanner framework 全平台LadonGo开源内网渗透扫描器框架,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。
Stars: ✭ 366 (+136.13%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-67.1%)
readhookRed-team tool to hook libc read syscall with a buffer overflow vulnerability.
Stars: ✭ 31 (-80%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+2592.26%)
CVE-2021-22205GitLab CE/EE Preauth RCE using ExifTool
Stars: ✭ 165 (+6.45%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-34.84%)
overflowA command-line tool for exploiting stack-based buffer overflow vulnerabilities.
Stars: ✭ 66 (-57.42%)
Exploit Cve 2016 10033PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container
Stars: ✭ 356 (+129.68%)
shu-shellWebshell Jumping Edition
Stars: ✭ 23 (-85.16%)
Cve 2019 07083389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (+125.81%)
getroot🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS
Stars: ✭ 34 (-78.06%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-18.71%)
rsGenrsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (-54.19%)
playwright-demosplaywright for scrapping and UI testing / automate testing workflows
Stars: ✭ 65 (-58.06%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-69.68%)
Drupalgeddon3Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-88.39%)
plausibleHybrid native + web app for Plausible Analytics
Stars: ✭ 47 (-69.68%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+780%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-18.06%)
WebbrowseriOS浏览器 Web Browser for iOS
Stars: ✭ 332 (+114.19%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-70.97%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-8.39%)
Cve 2018 7600💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002
Stars: ✭ 330 (+112.9%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (-42.58%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (+110.32%)
XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+56.77%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+5438.71%)
SpectrepocProof of concept code for the Spectre CPU exploit.
Stars: ✭ 239 (+54.19%)
ArmpwnRepository to train/learn memory corruption on the ARM platform.
Stars: ✭ 320 (+106.45%)
KillshotA Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
Stars: ✭ 237 (+52.9%)
UltralightNext-generation HTML renderer for apps and games
Stars: ✭ 3,585 (+2212.9%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-1.29%)
AdiumOfficial mirror of hg.adium.im
Stars: ✭ 146 (-5.81%)
SvscannerSVScanner - Scanner Vulnerability And MaSsive Exploit.
Stars: ✭ 143 (-7.74%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-16.13%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-26.45%)
CiscoexploitCisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)
Stars: ✭ 73 (-52.9%)
Heap ViewerAn IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+270.32%)
doonaNetwork based protocol fuzzer
Stars: ✭ 64 (-58.71%)