7,642 skills found · Page 1 of 255
KeygraphHQ / ShannonShannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vectors, and executes real exploits to prove vulnerabilities before they reach production.
The-Art-of-Hacking / H4ckerThis repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security, vulnerability research, exploit development, reverse engineering, and more. 🔥 Also check: https://hackertraining.org
chaitin / SafeLineSafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
Gallopsled / PwntoolsCTF framework and exploit development library
threat9 / RoutersploitExploitation Framework for Embedded Devices
PowerShellMafia / PowerSploitPowerSploit - A PowerShell Post-Exploitation Framework
screetsec / TheFatRatThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
beefproject / BeefThe Browser Exploitation Framework Project
pwndbg / PwndbgExploit Development and Reverse Engineering with GDB & LLDB Made Easy
malwaredllc / ByobAn open-source post-exploitation framework for students, researchers and developers.
n1nj4sec / PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
frohoff / YsoserialA proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
SecWiki / Windows Kernel Exploitswindows-kernel-exploits Windows平台提权漏洞集合
shellphish / How2heapA repository for learning various heap exploitation techniques.
hugsy / GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
offensive-security / ExploitdbThe legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb
EmpireProject / EmpireEmpire is a PowerShell and Python post-exploitation agent.
liamg / Traitor:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
samyk / PoisontapExploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
xairy / Linux Kernel ExploitationA collection of links related to Linux kernel security and exploitation