Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (+1791.94%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (+40.32%)
Proton zf6Proton Kernel for the Asus Zenfone 6 (2019), codename Kirin and also known as I01WD and ZS630KL.
Stars: ✭ 42 (-32.26%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+1266.13%)
PegaswitchPegaSwitch is an exploit toolkit for the Nintendo Switch
Stars: ✭ 922 (+1387.1%)
Ebpf exporter Prometheus exporter for custom eBPF metrics
Stars: ✭ 829 (+1237.1%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-24.19%)
RustyvisorA hypervisor written in Rust. A work in progress.
Stars: ✭ 39 (-37.1%)
Pi64A 64-bit OS for the Raspberry Pi 3
Stars: ✭ 720 (+1061.29%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1312.9%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+13746.77%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+1256.45%)
Wasabi AegYet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.
Stars: ✭ 23 (-62.9%)
LabsVulnerability Labs for security analysis
Stars: ✭ 1,002 (+1516.13%)
Linux LabDocker/Qemu Based Linux Kernel Learning, Development and Testing Environment; New Linux ELF Video Course from this project author: https://www.cctalk.com/m/group/88089283
Stars: ✭ 771 (+1143.55%)
KernelLinux kernel with modifications for Microsoft Surface devices.
Stars: ✭ 57 (-8.06%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+1045.16%)
K8cscanK8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
Stars: ✭ 693 (+1017.74%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-22.58%)
Prestashop Cve 2018 19126PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)
Stars: ✭ 37 (-40.32%)
JoomscanOWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+932.26%)
Cve 2017 0065Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-75.81%)
IcememeRoblox Exploit Source Code Called IceMeme with some cmds, lua c and limited lua execution with simple ui in c#
Stars: ✭ 42 (-32.26%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+1277.42%)
Pythempentest framework
Stars: ✭ 1,060 (+1609.68%)
Cve 2018 18852CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
Stars: ✭ 42 (-32.26%)
FlagcheckerFor effective cheating detection in competitions. Utilizes Linux Kernel Module (LKM) for generating flags.
Stars: ✭ 24 (-61.29%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+1640.32%)
ConfiscateDiscover duplication glitches, abusive staff giving items, x-ray or simply poor server economy.
Stars: ✭ 23 (-62.9%)
Researchnote通过issue和README来记录日常学习研究笔记 关注 机器学习系统,深度学习, LLVM,性能剖视, Linux操作系统内核 话题 关注 C/C++. JAVA. Python. Golang. Chisel. 编程语言话题 ( Writing Blogs using github issue and markdown! (inculding Machine Learning algs and system, LLVM, Linux kernel, java, python, c++, golang)
Stars: ✭ 41 (-33.87%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1346.77%)
Twitter Follow ExploitAutomated Twitter mass account creation and follow using Selenium and Tor VPN
Stars: ✭ 47 (-24.19%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+1188.71%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1500%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+1069.35%)
Sap exploitHere you can get full exploit for SAP NetWeaver AS JAVA
Stars: ✭ 60 (-3.23%)
OscpCollection of things made during my OSCP journey
Stars: ✭ 709 (+1043.55%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-37.1%)
HtshellsSelf contained htaccess shells and attacks
Stars: ✭ 708 (+1041.94%)
Linux Security PapersResearch paper collection for Linux kernel security from top security conferences.
Stars: ✭ 47 (-24.19%)
Spectre AttackExample of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Stars: ✭ 690 (+1012.9%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-40.32%)
NtrghidraFully Featured Nintendo DS Loader for Ghidra
Stars: ✭ 56 (-9.68%)
Exein Openwrt PublicOpenwrt 18.06.5 featured with the Exein's security framework
Stars: ✭ 36 (-41.94%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+890.32%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+890.32%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-27.42%)
Exploit Cve 2016 9920Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container
Stars: ✭ 34 (-45.16%)
Rop ToolA tool to help you write binary exploits
Stars: ✭ 590 (+851.61%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (+1461.29%)