slidesAlexander Makarov conference slides
Stars: ✭ 26 (-64.86%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-10.81%)
CamOverCamOver is a camera exploitation tool that allows to disclosure network camera admin password.
Stars: ✭ 217 (+193.24%)
Suid3numA standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (+362.16%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (+809.46%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1263.51%)
Md2googleslidesGenerate Google Slides from markdown
Stars: ✭ 4,093 (+5431.08%)
markdownslidesA "markdown-first" approach for generating beautiful browser-based slides easily. Based on Reveal.js and Reveal-Jekyll.
Stars: ✭ 37 (-50%)
prl guest to hostGuest to host VM escape exploit for Parallels Desktop
Stars: ✭ 26 (-64.86%)
Xaringanthemer😎 Give your xaringan slides some style
Stars: ✭ 337 (+355.41%)
linksys-wrt54gExploiting Linksys WRT54G using a vulnerability I found.
Stars: ✭ 31 (-58.11%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (+1485.14%)
PwnX.py🏴☠️ Pwn misconfigured sites running ShareX custom image uploader API through chained exploit
Stars: ✭ 30 (-59.46%)
GtfoSearch gtfobins and lolbas files from your terminal
Stars: ✭ 336 (+354.05%)
shakeitoffWindows MSI Installer LPE (CVE-2021-43883)
Stars: ✭ 68 (-8.11%)
WebslidesCreate HTML presentations in seconds —
Stars: ✭ 5,778 (+7708.11%)
JsshellAn interactive multi-user web JS shell
Stars: ✭ 330 (+345.95%)
takahashi.jsMake Takahashi-style slide easily!
Stars: ✭ 30 (-59.46%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (+340.54%)
fastoverflowtkThis Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
Stars: ✭ 16 (-78.38%)
Tensorflow Talk Debugging💬 Slides and supplementary codes for my talk 'Debugging Tips on TensorFlow' (2016)
Stars: ✭ 625 (+744.59%)
courses课件:数字图像处理,计算机视觉,人工智能导论,机器学习,深度学习
Stars: ✭ 58 (-21.62%)
ArmpwnRepository to train/learn memory corruption on the ARM platform.
Stars: ✭ 320 (+332.43%)
exploit-CVE-2015-3306ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container
Stars: ✭ 97 (+31.08%)
Pythempentest framework
Stars: ✭ 1,060 (+1332.43%)
expdevVulnerable software and exploits used for OSCP/OSCE preparation
Stars: ✭ 24 (-67.57%)
gitworkshopGit Workshop covering git essentials & advanced topics
Stars: ✭ 15 (-79.73%)
batchqlGraphQL security auditing script with a focus on performing batch GraphQL queries and mutations
Stars: ✭ 251 (+239.19%)
Discord-Block-BypassSimple script that utilities discord's flaw in detecting who blocked who.
Stars: ✭ 24 (-67.57%)
Freebsd PapersThe FreeBSD Papers, Slides, and Video Collection
Stars: ✭ 33 (-55.41%)
BFS2019Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
Stars: ✭ 20 (-72.97%)
Bigpresentations for busy messy hackers
Stars: ✭ 3,208 (+4235.14%)
Presenta LibA javascript library to build expressive web presentations in seconds.
Stars: ✭ 614 (+729.73%)
Ultimate-Guitar-HackThe first tool to download any Guitar Pro file, including 'Official' from Ultimate Guitar
Stars: ✭ 61 (-17.57%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-14.86%)
ShadowStealPure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Stars: ✭ 186 (+151.35%)
Nginx Lua Anti DdosA Anti-DDoS script to protect Nginx web servers using Lua with a HTML Javascript based authentication puzzle inspired by Cloudflare I am under attack mode an Anti-DDoS authentication page protect yourself from every attack type All Layer 7 Attacks Mitigating Historic Attacks DoS DoS Implications DDoS All Brute Force Attacks Zero day exploits Social Engineering Rainbow Tables Password Cracking Tools Password Lists Dictionary Attacks Time Delay Any Hosting Provider Any CMS or Custom Website Unlimited Attempt Frequency Search Attacks HTTP Basic Authentication HTTP Digest Authentication HTML Form Based Authentication Mask Attacks Rule-Based Search Attacks Combinator Attacks Botnet Attacks Unauthorized IPs IP Whitelisting Bruter THC Hydra John the Ripper Brutus Ophcrack unauthorized logins Injection Broken Authentication and Session Management Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Security Misconfiguration Cross-Site Scripting (XSS) Insecure Deserialization Using Components with Known Vulnerabilities Insufficient Logging & Monitoring Drupal WordPress Joomla Flash Magento PHP Plone WHMCS Atlassian Products malicious traffic Adult video script avs KVS Kernel Video Sharing Clip Bucket Tube sites Content Management Systems Social networks scripts backends proxy proxies PHP Python Porn sites xxx adult gaming networks servers sites forums vbulletin phpbb mybb smf simple machines forum xenforo web hosting video streaming buffering ldap upstream downstream download upload rtmp vod video over dl hls dash hds mss livestream drm mp4 mp3 swf css js html php python sex m3u zip rar archive compressed mitigation code source sourcecode chan 4chan 4chan.org 8chan.net 8ch 8ch.net infinite chan 8kun 8kun.net anonymous anon tor services .onion torproject.org nginx.org nginx.com openresty.org darknet dark net deepweb deep web darkweb dark web mirror vpn reddit reddit.com adobe flash hackthissite.org dreamhack hack hacked hacking hacker hackers hackerz hackz hacks code coding script scripting scripter source leaks leaked leaking cve vulnerability great firewall china america japan russia .gov government http1 http2 http3 quic q3 litespeedtech litespeed apache torrents torrent torrenting webtorrent bittorrent bitorrent bit-torrent cyberlocker cyberlockers cyber locker cyberbunker warez keygen key generator free irc internet relay chat peer-to-peer p2p cryptocurrency crypto bitcoin miner browser xmr monero coinhive coin hive coin-hive litecoin ethereum cpu cycles popads pop-ads advert advertisement networks banner ads protect ovh blazingfast.io amazon steampowered valve store.steampowered.com steamcommunity thepiratebay lulzsec antisec xhamster pornhub porn.com pornhub.com xhamster.com xvideos xvdideos.com xnxx xnxx.com popads popcash cpm ppc
Stars: ✭ 295 (+298.65%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-68.92%)
Code SurferRad code slides <🏄/>
Stars: ✭ 5,477 (+7301.35%)
DoubleStarA personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques
Stars: ✭ 140 (+89.19%)
VbscanOWASP VBScan is a Black Box vBulletin Vulnerability Scanner
Stars: ✭ 295 (+298.65%)
markdown-slidesUsing markdown, write simple but beautiful presentations with math, animations and media.
Stars: ✭ 64 (-13.51%)
TegrarcmguiC++ GUI for TegraRcmSmash (Fusée Gelée exploit for Nintendo Switch)
Stars: ✭ 965 (+1204.05%)
CloakCloak can backdoor any python script with some tricks.
Stars: ✭ 411 (+455.41%)
AEGPaperAutomatic Exploit Generation Paper
Stars: ✭ 30 (-59.46%)
DeauthdetectorDetect deauthentication frames using an ESP8266
Stars: ✭ 406 (+448.65%)
sqlinjection-training-appA simple PHP application to learn SQL Injection detection and exploitation techniques.
Stars: ✭ 56 (-24.32%)
winallenumThis powershell script has got to run in remote hacked windows host, even for pivoting
Stars: ✭ 13 (-82.43%)
Firmware slapDiscovering vulnerabilities in firmware through concolic analysis and function clustering.
Stars: ✭ 407 (+450%)
evilMACHOMalicious use of macho, such as dump-runtime-macho, function-hook.
Stars: ✭ 13 (-82.43%)