Exploit-DevelopmentExploit Development - Weaponized Exploit and Proof of Concepts (PoC)
Stars: ✭ 84 (+170.97%)
RopgadgetThis tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Stars: ✭ 2,908 (+9280.65%)
BFS2019Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
Stars: ✭ 20 (-35.48%)
rop-benchmarkROP Benchmark is a tool to compare ROP compilers
Stars: ✭ 23 (-25.81%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (+112.9%)
srcThis is the source of our Return Oriented Programming tool.
Stars: ✭ 14 (-54.84%)
DrGadgetdr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (+96.77%)
Rop ToolA tool to help you write binary exploits
Stars: ✭ 590 (+1803.23%)
ShadowStealPure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Stars: ✭ 186 (+500%)
H Encore 2Fully chained kernel exploit for the PS Vita on firmwares 3.65-3.73
Stars: ✭ 237 (+664.52%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+33612.9%)
TrinityTrinity Exploit - Emulator Escape
Stars: ✭ 371 (+1096.77%)
ronin-exploitsA Ruby micro-framework for writing and running exploits
Stars: ✭ 36 (+16.13%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+293.55%)
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
Stars: ✭ 69 (+122.58%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+4112.9%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+306.45%)
SubRosaBasic tool to automate backdooring PE files
Stars: ✭ 48 (+54.84%)
ROP-EmporiumSolutions for ROP Emporium challenges (https://ropemporium.com/) in python.
Stars: ✭ 38 (+22.58%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (+3022.58%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+27593.55%)
roprA blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative
Stars: ✭ 200 (+545.16%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+36887.1%)
GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+13438.71%)
Search LibcWeb wrapper of niklasb/libc-database
Stars: ✭ 124 (+300%)
Ctfsome experience in CTFs
Stars: ✭ 165 (+432.26%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+187.1%)
getroot🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS
Stars: ✭ 34 (+9.68%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (+67.74%)
CVE-2018-2380PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM
Stars: ✭ 55 (+77.42%)
researchVerSprite Security Research
Stars: ✭ 148 (+377.42%)
Detect It EasyProgram for determining types of files for Windows, Linux and MacOS.
Stars: ✭ 2,982 (+9519.35%)
rsGenrsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (+129.03%)
TrufflehogSearches through git repositories for high entropy strings and secrets, digging deep into commit history
Stars: ✭ 6,225 (+19980.65%)
truffleHogSearches through git repositories for high entropy strings and secrets, digging deep into commit history
Stars: ✭ 6,319 (+20283.87%)
overflowA command-line tool for exploiting stack-based buffer overflow vulnerabilities.
Stars: ✭ 66 (+112.9%)
BrahmaBrahma - Privilege elevation exploit for Nintendo 3DS
Stars: ✭ 34 (+9.68%)
ProSelfLC-2021noisy labels; missing labels; semi-supervised learning; entropy; uncertainty; robustness and generalisation.
Stars: ✭ 45 (+45.16%)
InlineWhispers2Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Stars: ✭ 156 (+403.23%)
ProbQAProbabilistic question-asking system: the program asks, the users answer. The minimal goal of the program is to identify what the user needs (a target), even if the user is not aware of the existence of such a thing/product/service.
Stars: ✭ 43 (+38.71%)
ntropy.jsA random generator (string and number)
Stars: ✭ 14 (-54.84%)
shu-shellWebshell Jumping Edition
Stars: ✭ 23 (-25.81%)
JALSIJALSI - Just Another Lame Shellcode Injector
Stars: ✭ 29 (-6.45%)
antropyAntroPy: entropy and complexity of (EEG) time-series in Python
Stars: ✭ 111 (+258.06%)
belgBoltzmann entropy of a landscape gradient
Stars: ✭ 14 (-54.84%)
purelovePurelove is a lightweight penetration testing framework, in order to better security testers testing holes with use.
Stars: ✭ 52 (+67.74%)
CausalityTools.jlAlgorithms for causal inference and the detection of dynamical coupling from time series, and for approximation of the transfer operator and invariant measures.
Stars: ✭ 45 (+45.16%)
CorBinianCorBinian: A toolbox for modelling and simulating high-dimensional binary and count-data with correlations
Stars: ✭ 15 (-51.61%)
CVE-2021-22205GitLab CE/EE Preauth RCE using ExifTool
Stars: ✭ 165 (+432.26%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+2187.1%)
atermIt records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-45.16%)
Drupalgeddon3Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-41.94%)
webpassgenSimple web-based password generator
Stars: ✭ 111 (+258.06%)