SirepratRemote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)
Stars: ✭ 326 (+50.23%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 211 (-2.76%)
WesngWindows Exploit Suggester - Next Generation
Stars: ✭ 2,675 (+1132.72%)
Quarkus Microservices PocVery simplified shop sales system made in a microservices architecture using quarkus
Stars: ✭ 16 (-92.63%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-29.49%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+280.65%)
Pwn2own2020Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
Stars: ✭ 314 (+44.7%)
UnjailmeA sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)
Stars: ✭ 73 (-66.36%)
Cve 2020 1206 PocCVE-2020-1206 Uninitialized Kernel Memory Read POC
Stars: ✭ 133 (-38.71%)
GowaptGo Web Application Penetration Test
Stars: ✭ 300 (+38.25%)
Clickjacking TesterA python script designed to check if the website if vulnerable of clickjacking and create a poc
Stars: ✭ 72 (-66.82%)
Hackers Tool KitIts a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (-2.76%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (+440.55%)
Poccollecta plenty of poc based on python
Stars: ✭ 289 (+33.18%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-41.47%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+1500.46%)
CtfSome of my CTF solutions
Stars: ✭ 70 (-67.74%)
ExpdevbadcharsBad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
Stars: ✭ 167 (-23.04%)
Cve 2017 11882CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.
Stars: ✭ 280 (+29.03%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+433.18%)
Pocsuite poc collectcollection poc use pocsuite framework 收集一些 poc with pocsuite框架
Stars: ✭ 127 (-41.47%)
PocProof of Concepts
Stars: ✭ 809 (+272.81%)
Fuzz.txtPotentially dangerous files
Stars: ✭ 1,382 (+536.87%)
Medusa🐈Medusa是一个红队武器库平台,目前包括扫描功能(200+个漏洞)、XSS平台、协同平台、CVE监控等功能,持续开发中 http://medusa.ascotbe.com
Stars: ✭ 796 (+266.82%)
Cve 2014 0038Linux local root exploit for CVE-2014-0038
Stars: ✭ 193 (-11.06%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (+20.74%)
Attack Surface Detector BurpThe Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Stars: ✭ 63 (-70.97%)
Cve 2020 0796 PocPoC for triggering buffer overflow via CVE-2020-0796
Stars: ✭ 266 (+22.58%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-41.94%)
ShellverReverse Shell Cheat Sheet TooL
Stars: ✭ 258 (+18.89%)
Uac exploitEscalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: ✭ 165 (-23.96%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+268.2%)
FlameCordPatch for Waterfall to improve performance during attacks and fix memory issues.
Stars: ✭ 103 (-52.53%)
MagevulndbList of Magento extensions with known security issues.
Stars: ✭ 152 (-29.95%)
1earn个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (+257.6%)
FuxiPenetration Testing Platform
Stars: ✭ 1,103 (+408.29%)
Bad PdfSteal Net-NTLM Hash using Bad-PDF
Stars: ✭ 748 (+244.7%)
OscpCollection of things made during my OSCP journey
Stars: ✭ 709 (+226.73%)
DvhmaDamn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.
Stars: ✭ 180 (-17.05%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-32.26%)
Cve 2019 1458CVE-2019-1458 Windows LPE Exploit
Stars: ✭ 101 (-53.46%)
HtshellsSelf contained htaccess shells and attacks
Stars: ✭ 708 (+226.27%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+397.24%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+528.57%)
Spectre AttackExample of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Stars: ✭ 690 (+217.97%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-32.72%)
FastjsonexploitFastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)
Stars: ✭ 645 (+197.24%)
JoomscanOWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+194.93%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (+519.35%)
SingularityA DNS rebinding attack framework.
Stars: ✭ 621 (+186.18%)
Ciscorv320dumpCVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!
Stars: ✭ 198 (-8.76%)
Butthaxlovense hush buttplug exploit chain
Stars: ✭ 180 (-17.05%)