Webrtc LeakCheck if your VPN leaks your IP address via the WebRTC technology
Stars: ✭ 133 (-19.39%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-36.36%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-11.52%)
Cve 2020 0796CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Stars: ✭ 1,102 (+567.88%)
Gdb StaticPublic repository of static GDB and GDBServer
Stars: ✭ 103 (-37.58%)
NtrghidraFully Featured Nintendo DS Loader for Ghidra
Stars: ✭ 56 (-66.06%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-23.03%)
Pythempentest framework
Stars: ✭ 1,060 (+542.42%)
Twitter Follow ExploitAutomated Twitter mass account creation and follow using Selenium and Tor VPN
Stars: ✭ 47 (-71.52%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (-3.64%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-70.91%)
Cve 2019 1458CVE-2019-1458 Windows LPE Exploit
Stars: ✭ 101 (-38.79%)
IcememeRoblox Exploit Source Code Called IceMeme with some cmds, lua c and limited lua execution with simple ui in c#
Stars: ✭ 42 (-74.55%)
PhonesploitA tool for remote ADB exploitation in Python3 for all Machines.
Stars: ✭ 122 (-26.06%)
Cve 2018 18852CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
Stars: ✭ 42 (-74.55%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+713.94%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+501.21%)
MtpwnPoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
Stars: ✭ 143 (-13.33%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+6233.94%)
Prestashop Cve 2018 19126PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)
Stars: ✭ 37 (-77.58%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+6849.09%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (+486.67%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-46.06%)
Cve 2017 0065Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-90.91%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+1296.97%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+417.58%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+676.36%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+409.7%)
Search LibcWeb wrapper of niklasb/libc-database
Stars: ✭ 124 (-24.85%)
ConfiscateDiscover duplication glitches, abusive staff giving items, x-ray or simply poor server economy.
Stars: ✭ 23 (-86.06%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+443.64%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-13.33%)
OscpCollection of things made during my OSCP journey
Stars: ✭ 709 (+329.7%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-47.27%)
K8cscanK8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
Stars: ✭ 693 (+320%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-26.06%)
JoomscanOWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+287.88%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-50.3%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+272.12%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-7.27%)
Rop ToolA tool to help you write binary exploits
Stars: ✭ 590 (+257.58%)
CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (-52.12%)
Heap ViewerAn IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+247.88%)
SafilerSafari local file reader
Stars: ✭ 118 (-28.48%)
UnauthdA local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Stars: ✭ 79 (-52.12%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+187.27%)
Cve 2017 0781Blueborne CVE-2017-0781 Android heap overflow vulnerability
Stars: ✭ 74 (-55.15%)
Ctfsome experience in CTFs
Stars: ✭ 165 (+0%)
Antimalware ResearchResearch on Anti-malware and other related security solutions
Stars: ✭ 163 (-1.21%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-10.91%)
Cve 2020 0688 expCVE-2020-0688_EXP Auto trigger payload & encrypt method
Stars: ✭ 134 (-18.79%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (+610.91%)