7,650 skills found · Page 2 of 255
k8gege / K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
longld / PedaPEDA - Python Exploit Development Assistance for GDB
RPISEC / MBECourse materials for Modern Binary Exploitation by RPISEC
secfigo / Awesome FuzzingA curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
commixproject / CommixAutomated All-in-One OS Command Injection Exploitation Tool
AzeemIdrisi / PhoneSploit ProAn all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
SecWiki / Linux Kernel Exploitslinux-kernel-exploits Linux平台提权漏洞集合
Ne0nd0g / MerlinMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
KingOfBugbounty / KingOfBugBountyTipsOur main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
NullArray / AutoSploitAutomated Mass Exploiter
RhinoSecurityLabs / PacuThe AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
bitsadmin / WesngWindows Exploit Suggester - Next Generation
infosecn1nja / AD Attack DefenseAttack and defend active directory using modern post exploitation adversary tradecraft activity
MlgmXyysd / Xiaomi HyperOS BootLoader BypassA PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings.
JonathanSalwan / ROPgadgetThis tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures.
RUB-NDS / PRETPrinter Exploitation Toolkit - The tool that made dumpster diving obsolete.
strozfriedberg / Windows Exploit SuggesterThis tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
epinna / TplmapServer-Side Template Injection and Code Injection Detection and Exploitation Tool
r0oth3x49 / GhauriAn advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
samyk / PwnatThe only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, DNS, router admin requirements, STUN/TURN/UPnP/ICE, or spoofing.