Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-56.06%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (-57.79%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-84.43%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-70.93%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+351.9%)
FastPwnCTF中Pwn的快速利用模板(包含awd pwn)
Stars: ✭ 18 (-93.77%)
GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+1352.25%)
Heapinspect🔍Heap analysis tool for CTF pwn.
Stars: ✭ 177 (-38.75%)
HyperpwnA hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
Stars: ✭ 387 (+33.91%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-77.16%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+176.47%)
CTFCTF binary exploit code
Stars: ✭ 37 (-87.2%)
ExploitsReal world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (-76.12%)
lightify-binary-protocolDocumentation of the OSRAM Lightify Binary Protocol for communication between Lightify Gateway and applications
Stars: ✭ 26 (-91%)
Pwn repoTo store some CTF_pwn_bins and exploits for self-practice
Stars: ✭ 256 (-11.42%)
external-protocol-floodingScheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Stars: ✭ 603 (+108.65%)
Commodity Injection SignaturesCommodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT
Stars: ✭ 267 (-7.61%)
FlameCordPatch for Waterfall to improve performance during attacks and fix memory issues.
Stars: ✭ 103 (-64.36%)
binarypackage binary is a lightweight and high-performance serialization library to encode/decode between go data and []byte.
Stars: ✭ 20 (-93.08%)
Exploit-DevelopmentExploit Development - Weaponized Exploit and Proof of Concepts (PoC)
Stars: ✭ 84 (-70.93%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-87.89%)
hugo-wrapperThe universal way to include Hugo binary to your project.
Stars: ✭ 27 (-90.66%)
ShellverReverse Shell Cheat Sheet TooL
Stars: ✭ 258 (-10.73%)
ezinjectModular binary injection framework, successor of libhooker
Stars: ✭ 47 (-83.74%)
Cve 2019 1003000 Jenkins Rce PocJenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Stars: ✭ 270 (-6.57%)
Chimay-Red-tinyThis is a minified exploit for mikrotik routers. It does not require any aditional modules to run.
Stars: ✭ 25 (-91.35%)
All-Discord-ExploitsThis is a list of Discord console scripts, bugs and exploits.
Stars: ✭ 34 (-88.24%)
Macos Kernel ExploitmacOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :)
Stars: ✭ 279 (-3.46%)
destiny-macrosA collection of Destiny 2 macros built with AutoHotKey
Stars: ✭ 24 (-91.7%)
CVE-2018-7750an RCE (remote command execution) approach of CVE-2018-7750
Stars: ✭ 18 (-93.77%)
log4j2-rce-exploitlog4j2 remote code execution or IP leakage exploit (with examples)
Stars: ✭ 62 (-78.55%)
Webcgi ExploitsMulti-language web CGI interfaces exploits.
Stars: ✭ 268 (-7.27%)
Penetration testing poc渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Stars: ✭ 3,858 (+1234.95%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-9.34%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-69.55%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-78.89%)
cve-2021-3449CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
Stars: ✭ 220 (-23.88%)
Welpwn💖CTF pwn framework.
Stars: ✭ 284 (-1.73%)
siaSia - Binary serialisation and deserialisation
Stars: ✭ 52 (-82.01%)
somaCross-platform CTF problem container manager
Stars: ✭ 23 (-92.04%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-91.7%)
protodataA textual language for binary data.
Stars: ✭ 35 (-87.89%)
Ctf WriteupsCollection of scripts and writeups
Stars: ✭ 266 (-7.96%)
EternalblueEternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
Stars: ✭ 150 (-48.1%)
MS17010EXPLadon Moudle MS17010 Exploit for PowerShell
Stars: ✭ 40 (-86.16%)
xbpchxarray interface for bpch files
Stars: ✭ 17 (-94.12%)
packagesCloud Posse DevOps distribution of linux packages for native apps, binaries, alpine packages, debian packages, and redhat packages.
Stars: ✭ 107 (-62.98%)
ctf-writeupsWriteups of CTF challenges
Stars: ✭ 19 (-93.43%)
XcframeworksDemonstration of creating and integrating xcframeworks and their co-op with static libraries and Swift packages
Stars: ✭ 272 (-5.88%)
xsymlinkXbox One Symbolic Link Exploit: Access restricted/encrypted volumes using the Xbox File Explorer.
Stars: ✭ 18 (-93.77%)
CVE-2021-33766ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
Stars: ✭ 37 (-87.2%)
structuresDeclarative binary data builder and parser: simple, fast, extensible
Stars: ✭ 29 (-89.97%)