crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-94.12%)
ShannonBasebandScripts, plugins, and information for working with Samsung's Shannon baseband.
Stars: ✭ 69 (-91.54%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-50.61%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-92.52%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-97.67%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (-92.28%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (-28.8%)
Sqli HunterSQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
Stars: ✭ 340 (-58.33%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (-63.73%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+451.47%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (-33.33%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (-24.75%)
r2con-prequals-rhme3r2 the Rhme3! The RHme (Riscure Hack me) is a low level hardware CTF that comes in the form of an Arduino board (AVR architecture). It involves a set of SW and HW challenges to test your skills in different areas such as side channel analysis, fault injection, reverse-engineering and software exploitation. In our talk we will briefly recap RHme2…
Stars: ✭ 15 (-98.16%)
PwndraA collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (-48.9%)
AEGPaperAutomatic Exploit Generation Paper
Stars: ✭ 30 (-96.32%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (-12.99%)
ROP-EmporiumSolutions for ROP Emporium challenges (https://ropemporium.com/) in python.
Stars: ✭ 38 (-95.34%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-55.76%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-90.81%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-30.51%)
AndroratAndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (-58.33%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-95.34%)
MbeCourse materials for Modern Binary Exploitation by RPISEC
Stars: ✭ 4,674 (+472.79%)
formatstringFormat string exploitation helper
Stars: ✭ 45 (-94.49%)
Exploit meVery vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Stars: ✭ 665 (-18.5%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (-46.69%)
empirectfEmpireCTF – write-ups, capture the flag, cybersecurity
Stars: ✭ 122 (-85.05%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-10.78%)
Wadcoms.github.ioWADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (-47.18%)
AttifyosAttify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (-24.63%)
magisk-fridaYou are probably looking for: https://github.com/ViRb3/magisk-frida
Stars: ✭ 47 (-94.24%)
BotbA container analysis and exploitation tool for pentesters and engineers.
Stars: ✭ 414 (-49.26%)
xgadgetFast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-95.96%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (-2.08%)
SqlmapAutomatic SQL injection and database takeover tool
Stars: ✭ 21,907 (+2584.68%)
roprA blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative
Stars: ✭ 200 (-75.49%)
Heap ViewerAn IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (-29.66%)
CVE-2016-7255An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Stars: ✭ 85 (-89.58%)
HeapwnLinux Heap Exploitation Practice
Stars: ✭ 344 (-57.84%)
Exploit WriteupsA collection where my current and future writeups for exploits/CTF will go
Stars: ✭ 676 (-17.16%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (-79.53%)
Suid3numA standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (-58.09%)
phuzzFind exploitable PHP files by parameter fuzzing and function call tracing
Stars: ✭ 53 (-93.5%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (-38.85%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+850%)
BinexpLinux Binary Exploitation
Stars: ✭ 742 (-9.07%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (-17.52%)