Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (+415.71%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (+322.86%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+777.14%)
PwndraA collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (+495.71%)
r2con-prequals-rhme3r2 the Rhme3! The RHme (Riscure Hack me) is a low level hardware CTF that comes in the form of an Arduino board (AVR architecture). It involves a set of SW and HW challenges to test your skills in different areas such as side channel analysis, fault injection, reverse-engineering and software exploitation. In our talk we will briefly recap RHme2…
Stars: ✭ 15 (-78.57%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+914.29%)
AndroratAndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+385.71%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1181.43%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+677.14%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (+710%)
AEGPaperAutomatic Exploit Generation Paper
Stars: ✭ 30 (-57.14%)
BinexpLinux Binary Exploitation
Stars: ✭ 742 (+960%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+475.71%)
Leviathanwide range mass audit toolkit
Stars: ✭ 862 (+1131.43%)
Sqli HunterSQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
Stars: ✭ 340 (+385.71%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (+861.43%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-12.86%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (+730%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-31.43%)
AtscanAdvanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (+1067.14%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (-10%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+521.43%)
xgadgetFast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-52.86%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+1041.43%)
Wadcoms.github.ioWADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (+515.71%)
BotbA container analysis and exploitation tool for pentesters and engineers.
Stars: ✭ 414 (+491.43%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+940%)
SqlmapAutomatic SQL injection and database takeover tool
Stars: ✭ 21,907 (+31195.71%)
FoxpwnExploit code for CVE-2016-9066
Stars: ✭ 39 (-44.29%)
HeapwnLinux Heap Exploitation Practice
Stars: ✭ 344 (+391.43%)
Exploit WriteupsA collection where my current and future writeups for exploits/CTF will go
Stars: ✭ 676 (+865.71%)
Suid3numA standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (+388.57%)
Exploit meVery vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Stars: ✭ 665 (+850%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-35.71%)
formatstringFormat string exploitation helper
Stars: ✭ 45 (-35.71%)
AttifyosAttify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (+778.57%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+10220%)
empirectfEmpireCTF – write-ups, capture the flag, cybersecurity
Stars: ✭ 122 (+74.29%)
Heap ViewerAn IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+720%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-47.14%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+612.86%)
magisk-fridaYou are probably looking for: https://github.com/ViRb3/magisk-frida
Stars: ✭ 47 (-32.86%)
WindowsAwesome tools to exploit Windows !
Stars: ✭ 816 (+1065.71%)
MbeCourse materials for Modern Binary Exploitation by RPISEC
Stars: ✭ 4,674 (+6577.14%)
Binary ExploitationGood to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-32.86%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1341.43%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1151.43%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+10974.29%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+6328.57%)