Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Red Teaming Toolkit | 8,230 | 8 months ago | gpl-3.0 | |||||||
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter. | ||||||||||
Penetration_testing_poc | 5,946 | 8 months ago | 2 | apache-2.0 | HTML | |||||
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms | ||||||||||
Cve | 5,806 | 8 months ago | 13 | mit | HTML | |||||
Gather and update all available and newest CVEs with their PoC. | ||||||||||
Poc In Github | 5,704 | 8 months ago | 12 | |||||||
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware. | ||||||||||
Linux Kernel Exploitation | 5,116 | 8 months ago | cc-by-4.0 | |||||||
A collection of links related to Linux kernel security and exploitation | ||||||||||
Jwt_tool | 4,639 | 9 months ago | 50 | gpl-3.0 | Python | |||||
:snake: A toolkit for testing, tweaking and cracking JSON Web Tokens | ||||||||||
Vulmap | 2,935 | a year ago | 28 | gpl-3.0 | Python | |||||
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能 | ||||||||||
Kernelhub | 2,919 | 2 years ago | agpl-3.0 | C | ||||||
:palm_tree:Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集) | ||||||||||
Exphub | 2,458 | 3 years ago | 4 | Python | ||||||
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340 | ||||||||||
Sudo_killer | 2,032 | 8 months ago | mit | Shell | ||||||
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user. |