Poc ExploitsSelect proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (-53.56%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-62.76%)
Kernelpopkernel privilege escalation enumeration and exploitation framework
Stars: ✭ 628 (+162.76%)
0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (-37.66%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-52.3%)
PocAdvisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (+57.32%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-69.87%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-47.7%)
ExploitsContaining Self Made Perl Reproducers / PoC Codes
Stars: ✭ 160 (-33.05%)
Awesome SolidityA curated list of awesome Solidity resources
Stars: ✭ 111 (-53.56%)
Cve Searchcve-search - a tool to perform local searches for known vulnerabilities
Stars: ✭ 1,765 (+638.49%)
Laravel Security CheckerAdded Laravel functionality to Enlightn Security Checker. Adds a command to check for, and optionally emails you, vulnerabilities when they affect you.
Stars: ✭ 163 (-31.8%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-52.3%)
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (-21.76%)
Go ShodanShodan API client
Stars: ✭ 158 (-33.89%)
NodegoatThe OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Stars: ✭ 1,392 (+482.43%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-57.74%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-59%)
Cve Bin ToolThis tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
Stars: ✭ 211 (-11.72%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+461.92%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-63.18%)
Exploit Framework🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (-39.75%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+4272.8%)
Vuln Web AppsA curated list of vulnerable web applications.
Stars: ✭ 128 (-46.44%)
MysapadventuresA quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters
Stars: ✭ 164 (-31.38%)
Is Website Vulnerablefinds publicly known security vulnerabilities in a website's frontend JavaScript libraries
Stars: ✭ 1,724 (+621.34%)
EasybuggyToo buggy web application
Stars: ✭ 189 (-20.92%)
VulnixVulnerability (CVE) scanner for Nix/NixOS.
Stars: ✭ 161 (-32.64%)
Dependency spyFind known vulnerabilities in your dependencies
Stars: ✭ 87 (-63.6%)
Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (-7.11%)
OsceCollection of things made during my preparation to take on OSCE
Stars: ✭ 167 (-30.13%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+428.87%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (-33.47%)
S2eS2E: A platform for multi-path program analysis with selective symbolic execution.
Stars: ✭ 102 (-57.32%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+4028.03%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (-35.56%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+450.63%)
VulncostFind security vulnerabilities in open source npm packages while you code
Stars: ✭ 146 (-38.91%)
AvpwnList of real-world threats against endpoint protection software
Stars: ✭ 179 (-25.1%)
SdwannewhopeSD-WAN security and insecurity
Stars: ✭ 141 (-41%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-63.6%)
Vulny Code Static AnalysisPython script to detect vulnerabilities inside PHP source code using static analysis, based on regex
Stars: ✭ 207 (-13.39%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-44.35%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+430.54%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-66.11%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-66.11%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-44.77%)
VwgenVulnerable Web applications Generator
Stars: ✭ 75 (-68.62%)
Anchore EngineA service that analyzes docker images and applies user-defined acceptance policies to allow automated container image validation and certification
Stars: ✭ 1,192 (+398.74%)
ArcherysecCentralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (+653.97%)
Insecureprogrammingmirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
Stars: ✭ 229 (-4.18%)