CamRaptorCamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (+103.85%)
CloakCloak can backdoor any python script with some tricks.
Stars: ✭ 411 (+690.38%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-28.85%)
Hackers Tool KitIts a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (+305.77%)
TegrarcmguiC++ GUI for TegraRcmSmash (Fusée Gelée exploit for Nintendo Switch)
Stars: ✭ 965 (+1755.77%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+257.69%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (+61.54%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+142.31%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (+67.31%)
Ciscorv320dumpCVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!
Stars: ✭ 198 (+280.77%)
Awesome Vm Exploit share some useful archives about vm and qemu escape exploit.
Stars: ✭ 239 (+359.62%)
ExpcameraExploit Netwave and GoAhead IP Camera
Stars: ✭ 194 (+273.08%)
AndroratA Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Stars: ✭ 187 (+259.62%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+169.23%)
H Encore 2Fully chained kernel exploit for the PS Vita on firmwares 3.65-3.73
Stars: ✭ 237 (+355.77%)
Cve 2020 1472Exploit Code for CVE-2020-1472 aka Zerologon
Stars: ✭ 183 (+251.92%)
Php Antimalware ScannerAMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (+248.08%)
Lost Nds TvThe Lost Nintendo DS Television Output, brought back to life
Stars: ✭ 221 (+325%)
Butthaxlovense hush buttplug exploit chain
Stars: ✭ 180 (+246.15%)
Heapinspect🔍Heap analysis tool for CTF pwn.
Stars: ✭ 177 (+240.38%)
xecaPowerShell payload generator
Stars: ✭ 103 (+98.08%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (+0%)
ExphubExphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
Stars: ✭ 3,056 (+5776.92%)
WesngWindows Exploit Suggester - Next Generation
Stars: ✭ 2,675 (+5044.23%)
SpectrepocProof of concept code for the Spectre CPU exploit.
Stars: ✭ 239 (+359.62%)
IronsquirrelEncrypted exploit delivery for the masses
Stars: ✭ 197 (+278.85%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+173.08%)
Cve 2014 0038Linux local root exploit for CVE-2014-0038
Stars: ✭ 193 (+271.15%)
KillshotA Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
Stars: ✭ 237 (+355.77%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+144.23%)
ShodanwaveShodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
Stars: ✭ 183 (+251.92%)
DccwbypassuacWindows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
Stars: ✭ 227 (+336.54%)
Airdos💣 Remotely render any nearby iPhone or iPad unusable
Stars: ✭ 182 (+250%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+71.15%)
Cod Exploits☠️ Call of Duty - Vulnerabilities and proof-of-concepts
Stars: ✭ 178 (+242.31%)
Nekobotv1NekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell
Stars: ✭ 225 (+332.69%)
JsshellJSshell - JavaScript reverse/remote shell
Stars: ✭ 167 (+221.15%)
badcharsBad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.
Stars: ✭ 178 (+242.31%)
ExpdevbadcharsBad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
Stars: ✭ 167 (+221.15%)
PubVulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb
Stars: ✭ 217 (+317.31%)
Uac exploitEscalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: ✭ 165 (+217.31%)
Ctfsome experience in CTFs
Stars: ✭ 165 (+217.31%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+4332.69%)
Antimalware ResearchResearch on Anti-malware and other related security solutions
Stars: ✭ 163 (+213.46%)
Angularjs Csti ScannerAutomated client-side template injection (sandbox escape/bypass) detection for AngularJS.
Stars: ✭ 214 (+311.54%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (+205.77%)
pysploit-frameworkfree exploit framework written use python language version 3.3
Stars: ✭ 33 (-36.54%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (+194.23%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (+182.69%)
ActivereignA Network Enumeration and Attack Toolset for Windows Active Directory Environments.
Stars: ✭ 210 (+303.85%)