Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation attacker
attacker
x
exploitation
x
12 search results found
Labs
⭐
939
Vulnerability Labs for security analysis
Cve 2017 11882
⭐
464
Proof-of-Concept exploits for CVE-2017-11882
Subaru Starlink Research
⭐
405
Subaru StarLink persistent root code execution.
Daily Info
⭐
280
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Insecure Firebase Exploit
⭐
154
A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase db.
Leaky Leaky
⭐
152
[PATCHED] Exploit that allows one to authenticate as any user in Minecraft
Mosquito
⭐
143
XSS exploitation tool - access victims through HTTP proxy
Apache Superset Remote Code Execution Poc Cve 2018 8021
⭐
102
CVE-2018-8021 Proof-Of-Concept and Exploit
Bodhi
⭐
92
Bodhi - Client-side Vulnerability Playground
Mose
⭐
72
Post exploitation tool for configuration management servers.
Sentinel
⭐
64
Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect your programs against 0-day attacks or publicly known bugs.
Exploits
⭐
49
Real world and CTFs exploiting web/binary POCs.
Cve 2016 1764
⭐
41
Extraction of iMessage Data via XSS
Xattacker
⭐
39
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Dumpit
⭐
36
An exploit for SHAREit <= v 4.0.38
Dir8xx_poc
⭐
35
Proof-of-Concept exploits for D-Link DIR8xx routers
Wd Rce
⭐
31
WD My Cloud PoC exploit
Brutus
⭐
30
Botnet targeting Windows machines written entirely in Python & open source security project.
Cve 2020 15906
⭐
27
Writeup of CVE-2020-15906
Poc Cve 2018 0114
⭐
25
This repository contains the POC of an exploit for node-jose < 0.11.0
Blindref
⭐
24
BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework
Asus Smarthome Exploit
⭐
22
ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063
Offensive Tor Toolkit
⭐
20
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
Nhastie
⭐
15
NTLM HTTP Authentication Session Tier Exploit
Winmagic_sd
⭐
12
Technical Write-Up on and PoC Exploit for CVE-2020-11519 and CVE-2020-11520
Cve 2006 6184
⭐
11
This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.
Cve 2015 3073
⭐
9
CVE-2015-3073 PoC
Dlsw_exploit
⭐
9
cisco dlsw exploit
Mock Dao Hack
⭐
9
Simplified "DAO" contract and attacker contract to recursively exploit it
Vulnexipy
⭐
7
Vulnerabilities exploitation examples, python
Cve 2017 5638
⭐
7
Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header
Poodle
⭐
6
Working exploit code for the POODLE attack on SSLv3
Basic And Low Level Python Network Attacks
⭐
6
Basic and low-level Python Network Attacks
Firepwner
⭐
5
Exploit for CVE-2015-6357 Cisco FireSIGHT Management Center Certificate Validation Vulnerability
Iot Securitychecker
⭐
5
IoT Security Checker is a framework for automating some IoT-related security checks
Related Searches
Python Exploitation (1,616)
Exploitation Cve (771)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Python Attacker (365)
Exploitation Penetration Testing (353)
Attack Attacker (278)
Java Exploitation (192)
1-12 of 12 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.