Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security exploitation
exploitation
x
security
x
80 search results found
Hacker Roadmap
⭐
13,319
A collection of hacking tools, resources and references to practice ethical hacking.
Routersploit
⭐
12,346
Exploitation Framework for Embedded Devices
Beef
⭐
9,150
The Browser Exploitation Framework Project
Nuclei Templates
⭐
7,614
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Cve
⭐
5,806
Gather and update all available and newest CVEs with their PoC.
Yakit
⭐
5,790
Cyber Security ALL-IN-ONE Platform
Poc In Github
⭐
5,704
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
Linux Kernel Exploitation
⭐
5,116
A collection of links related to Linux kernel security and exploitation
Ladon
⭐
4,947
Ladon大型内网渗透扫描器,PowerShell、Cobalt Strike插件、内存加载、无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、
Autosploit
⭐
4,858
Automated Mass Exploiter
Ctf All In One
⭐
4,230
CTF竞赛权威指南
Pacu
⭐
3,879
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Awesome Pentest Cheat Sheets
⭐
3,617
Collection of the cheat sheets useful for pentesting
Qark
⭐
3,083
Tool to look for several security related Android application vulnerabilities
Kscan
⭐
3,061
Kscan是一款纯go开发的全方位扫描器,具备端口扫描、协议检测、指纹识别,暴力破解等功能。支持协议
Vulscan
⭐
2,983
Advanced vulnerability scanning with Nmap NSE
Xunfeng
⭐
2,946
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Vulmap
⭐
2,935
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能
Penetration Testing Tools
⭐
2,626
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Iotsecurity101
⭐
2,370
A Curated list of IoT Security Resources
Pentest Wiki
⭐
2,307
PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
Rizin
⭐
2,290
UNIX-like reverse engineering framework and command-line toolset.
Tinc
⭐
1,810
a VPN daemon
100 Redteam Projects
⭐
1,661
Projects for security students
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Exploits
⭐
1,484
Miscellaneous exploit code
Damn Vulnerable Graphql Application
⭐
1,387
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Atscan
⭐
1,270
Advanced dork Search & Mass Exploit Scanner
K8cscan
⭐
1,263
K8Ladon大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用 C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆 Strike联动
Securitylab
⭐
1,246
Resources related to GitHub Security Lab
Awesome Exploit Development
⭐
1,175
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
Reentrancy Attacks
⭐
1,115
A chronological and (hopefully) complete list of reentrancy attacks to date.
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Herpaderping
⭐
986
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Labs
⭐
939
Vulnerability Labs for security analysis
Linuxprivchecker
⭐
934
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Featherduster
⭐
928
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Awesome Hacking
⭐
928
awesome hacking chinese version
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Wordpress Exploit Framework
⭐
822
A Ruby framework designed to aid in the penetration testing of WordPress systems.
Htshells
⭐
801
Self contained htaccess shells and attacks
Powerzure
⭐
771
PowerShell framework to assess Azure security
Routeros
⭐
762
RouterOS Security Research Tooling and Proof of Concepts
Awesome List Of Secrets In Environment Variables
⭐
722
🦄🔒 Awesome list of secrets in environment variables 🖥️
Magisk Frida
⭐
710
🔐 Run frida-server on boot with Magisk, always up-to-date
Stunner
⭐
690
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
Security Data Analysis And Visualization
⭐
681
2018-2020青年安全圈-活跃技术博主/博客
Fireelf
⭐
657
fireELF - Fileless Linux Malware Framework
Autopwn Suite
⭐
636
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
Nuclei Wordfence Cve
⭐
627
You just found a hidden gem 💎 This repo contains a massive amount (9,000+) of WordPress related Nuclei templates. Updated daily!
External Protocol Flooding
⭐
624
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Cve 2021 44228 Poc Log4j Bypass Words
⭐
611
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Ronin
⭐
600
Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositories.
Kernelpop
⭐
594
kernel privilege escalation enumeration and exploitation framework
Jok3r
⭐
564
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
List Infosec Encyclopedia
⭐
556
A list of information security related awesome lists and other resources.
Am I Affected By Meltdown
⭐
547
Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
Cmspoc
⭐
530
CMS渗透测试框架-A CMS Exploit Framework
Dirty_sock
⭐
510
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Attifyos
⭐
508
Attify OS - Distro for pentesting IoT devices
Shodansploit
⭐
437
🔎 shodansploit > v1.3.0
Oscp Pwk
⭐
434
This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
Securitymanageframwork
⭐
421
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Hivenightmare
⭐
410
Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
Rucky
⭐
402
A simple to use USB HID Rubber Ducky Launch Pad for Android.
Cve 2019 0708
⭐
385
3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Kdexploitme
⭐
380
A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.
Awesome Csirt
⭐
368
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Android Security Exploits Youtube Curriculum
⭐
357
🔓A curated list of modern Android exploitation conference talks.
Hershell
⭐
355
Multiplatform reverse shell generator
Sec Admin
⭐
329
分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Docker Hacklab
⭐
324
My personal hacklab, create your own.
Ropium
⭐
314
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
East
⭐
293
Exploits and Security Tools Framework 2.0.1
Badpods
⭐
283
A collection of manifests that will create pods with elevated privileges.
Theo
⭐
263
Ethereum recon and exploitation tool.
Fdsploit
⭐
257
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Cve 2019 1003000 Jenkins Rce Poc
⭐
254
Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Telegram Trilateration
⭐
242
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
Pub
⭐
242
Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Angularjs Csti Scanner
⭐
234
Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.
Pown
⭐
234
Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.
Nacs
⭐
230
事件驱动的渗透测试扫描器 Event-driven pentest scanner
Flamecord
⭐
229
The ultimate antibot BungeeCord and Waterfall fork for a Secure and Fast Minecraft or Spigot Network. FlameCord protects your server from bot attacks and exploits with its antibot features. FlameCord also fixes bugs, improves performance and adds new functionalities. Download FlameCord now.🔥
Cvemon
⭐
228
Monitoring exploits & references for CVEs
Rfi Lfi Payload List
⭐
224
🎯 RFI/LFI Payload List
Shiva
⭐
222
An Ansible playbook to provision a host for penetration testing and CTF challenges
Awesome Cyber Security List
⭐
215
Allinfosecnews_sources
⭐
212
A list of online news & info sources in the InfoSec/Cybersecurity space
Linux Soft Exploit Suggester
⭐
204
Search Exploitable Software on Linux
Handbook
⭐
196
A living document for penetration testing and offensive security.
Avpwn
⭐
191
List of real-world threats against endpoint protection software
Ctf Awesome Resources
⭐
185
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
Jiraffe
⭐
178
One stop place for exploiting Jira instances in your proximity
Powerladon
⭐
177
Ladon hacking Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Go Shodan
⭐
167
Shodan API client
Hackembedded
⭐
161
This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices
Binarybook
⭐
157
Related Searches
Security Vulnerabilities (12,295)
Laravel Security (11,580)
Php Security (10,611)
Javascript Security (3,038)
Html Security (2,284)
Python Security (1,733)
Python Exploitation (1,616)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
1-80 of 80 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2025 Awesome Open Source. All rights reserved.