PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-97.1%)
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-93.22%)
CiscoexploitCisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)
Stars: ✭ 73 (-94.56%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (-5.88%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-94.56%)
Apac ConferencesA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-93.3%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (-5.58%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (-12.14%)
Lor Axe🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Stars: ✭ 72 (-94.64%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-93.6%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-94.64%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (-12.66%)
FormationvideoContenus et ressources de la chaîne FormationVidéo (YouTube)
Stars: ✭ 91 (-93.22%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-93.37%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (-6.25%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (-13.03%)
CtfSome of my CTF solutions
Stars: ✭ 70 (-94.79%)
Methodtraceman用于快速找到高耗时方法,定位解决Android App卡顿问题。通过gradle plugin+ASM实现可配置范围的方法插桩来统计所有方法的耗时,并提供友好的界面展示,支持耗时筛选、线程筛选、方法名筛选等。(A Tool for Discovering High Time-consuming Methods for Android App)
Stars: ✭ 1,258 (-6.33%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-94.79%)
Toledo AtomchessToledo Atomchess is the world's smallest chess program in x86 assembly code
Stars: ✭ 69 (-94.86%)
Instabruteforcehacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-93.6%)
OseeCollection of things made during my preparation to take on OSEE
Stars: ✭ 69 (-94.86%)
Jenkins ShellAutomating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-93.75%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (-13.63%)
Github DorksFind leaked secrets via github search
Stars: ✭ 1,332 (-0.82%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (-2.01%)
Redteam vul红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (-5.36%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-93.75%)
Poc BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 68 (-94.94%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-95.23%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (-7%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-93.37%)
WindowsexploitsWindows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
Stars: ✭ 1,243 (-7.45%)
Asm Module✈️ ASM 4 教程中的示例代码,用于 ASM 学习,介绍了 ASM 中基本的使用说明。
Stars: ✭ 65 (-95.16%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-95.16%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-93.89%)
Simplify CoreSimplify 为简化重复的JAVA代码而生,基于JDK8,无其它jar包依赖,提供序列化,json parse/generator,日期处理,asm && jdkproxy 实现动态代理功能 等常见操作。
Stars: ✭ 65 (-95.16%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (-2.76%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-95.16%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-95.16%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-15.41%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (-15.71%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-93.52%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-93.97%)
Knowledge Basepdf,txt,djvu, various useful books
Stars: ✭ 63 (-95.31%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-93.97%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-95.38%)
UnlockdownDisabling kernel lockdown on Ubuntu without physical access
Stars: ✭ 62 (-95.38%)
Spykeyboardkeylogger which sends us the data to our gmail.
Stars: ✭ 95 (-92.93%)
HlslexplorerSee how hardware understands your HLSL
Stars: ✭ 91 (-93.22%)
Ble Security Attack Defence✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-93.45%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-94.04%)
Sap exploitHere you can get full exploit for SAP NetWeaver AS JAVA
Stars: ✭ 60 (-95.53%)