Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security exploitation
exploitation
x
security
x
363 search results found
Routersploit
⭐
11,367
Exploitation Framework for Embedded Devices
Hacker Roadmap
⭐
11,121
A collection of hacking tools, resources and references to practice ethical hacking.
Beef
⭐
8,756
The Browser Exploitation Framework Project
Nuclei Templates
⭐
6,969
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Awesome Hacker Search Engines
⭐
5,785
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Yakit
⭐
5,533
Cyber Security ALL-IN-ONE Platform
Poc In Github
⭐
5,349
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
Cve
⭐
5,337
Gather and update all available and newest CVEs with their PoC.
Linux Kernel Exploitation
⭐
4,907
A collection of links related to Linux kernel security and exploitation
Autosploit
⭐
4,749
Automated Mass Exploiter
Ladon
⭐
4,206
Ladon大型内网渗透工具,可PowerShell模块化、可CS插件化、可内存加载,无文件扫描。含端 11.6内置252个功能,网络资产探测模块32个通过多种协议(ICMP\NBT\DNS\MAC\SM
Active Directory Exploitation Cheat Sheet
⭐
3,972
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Pacu
⭐
3,653
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Awesome Pentest Cheat Sheets
⭐
3,349
Collection of the cheat sheets useful for pentesting
Ctf All In One
⭐
3,313
CTF竞赛权威指南
Kscan
⭐
3,061
Kscan是一款纯go开发的全方位扫描器,具备端口扫描、协议检测、指纹识别,暴力破解等功能。支持协议
Qark
⭐
3,026
Tool to look for several security related Android application vulnerabilities
Vulscan
⭐
2,983
Advanced vulnerability scanning with Nmap NSE
Xunfeng
⭐
2,946
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Vulmap
⭐
2,935
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能
Pentest Wiki
⭐
2,307
PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
Iotsecurity101
⭐
2,236
A Curated list of IoT Security Resources
Penetration Testing Tools
⭐
2,167
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Rizin
⭐
2,101
UNIX-like reverse engineering framework and command-line toolset.
Awesome Ethical Hacking Resources
⭐
2,029
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Tools
⭐
1,742
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Tinc
⭐
1,532
a VPN daemon
100 Redteam Projects
⭐
1,521
Projects for security students
Awesome Industrial Control System Security
⭐
1,315
A curated list of resources related to Industrial Control System (ICS) security.
Damn Vulnerable Graphql Application
⭐
1,291
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Atscan
⭐
1,238
Advanced dork Search & Mass Exploit Scanner
Heap Exploitation
⭐
1,192
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
Securitylab
⭐
1,190
Resources related to GitHub Security Lab
Exploits
⭐
1,177
Miscellaneous exploit code
Awesome Exploit Development
⭐
1,175
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
Goby
⭐
1,081
Attack surface mapping
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
K8cscan
⭐
996
K8Ladon大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用 C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆 Strike联动
Herpaderping
⭐
986
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Labs
⭐
939
Vulnerability Labs for security analysis
Linuxprivchecker
⭐
934
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Awesome Hacking
⭐
928
awesome hacking chinese version
Featherduster
⭐
928
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Reentrancy Attacks
⭐
922
A chronological and (hopefully) complete list of reentrancy attacks to date.
Autoblue Ms17 010
⭐
873
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
Vfeed
⭐
830
The Correlated CVE Vulnerability And Threat Intelligence Database API
Wordpress Exploit Framework
⭐
822
A Ruby framework designed to aid in the penetration testing of WordPress systems.
Htshells
⭐
801
Self contained htaccess shells and attacks
Powerzure
⭐
771
PowerShell framework to assess Azure security
Routeros
⭐
762
RouterOS Security Research Tooling and Proof of Concepts
Awesome List Of Secrets In Environment Variables
⭐
722
🦄🔒 Awesome list of secrets in environment variables 🖥️
Security Data Analysis And Visualization
⭐
681
2018-2020青年安全圈-活跃技术博主/博客
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stunner
⭐
658
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
Nginx Lua Anti Ddos
⭐
649
A Anti-DDoS script to protect Nginx web servers using Lua with a HTML Javascript based authentication puzzle inspired by Cloudflare I am under attack mode an Anti-DDoS authentication page protect yourself from every attack type All Layer 7 Attacks Mitigating Historic Attacks DoS DoS Implications DDoS All Brute Force Attacks Zero day exploits Social Engineering Rainbow Tables Password Cracking Tools Password Lists Dictionary Attacks Time Delay Any Hosting Provider Any CMS or Custom Website Unlimi
Autopwn Suite
⭐
636
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
External Protocol Flooding
⭐
624
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Cve 2021 44228 Poc Log4j Bypass Words
⭐
611
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Fireelf
⭐
597
fireELF - Fileless Linux Malware Framework
Kernelpop
⭐
594
kernel privilege escalation enumeration and exploitation framework
Magisk Frida
⭐
592
🔐 Run frida-server on boot with Magisk, always up-to-date
Ronin
⭐
572
Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositories.
Jok3r
⭐
564
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Mxtract
⭐
557
mXtract - Memory Extractor & Analyzer
Am I Affected By Meltdown
⭐
547
Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
Cmspoc
⭐
530
CMS渗透测试框架-A CMS Exploit Framework
List Infosec Encyclopedia
⭐
521
A list of information security related awesome lists and other resources.
Dirty_sock
⭐
510
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Attifyos
⭐
508
Attify OS - Distro for pentesting IoT devices
Nuclei Wordfence Cve
⭐
482
You just found a hidden gem 💎 This repo contains a massive amount (8000+) of WordPress related Nuclei templates. Updated daily!
Shodansploit
⭐
437
🔎 shodansploit > v1.3.0
Oscp Pwk
⭐
434
This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
Securitymanageframwork
⭐
415
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
How2exploit_binary
⭐
415
An in depth tutorial on how to do binary exploitation
Hivenightmare
⭐
410
Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
Rucky
⭐
402
A simple to use USB HID Rubber Ducky Launch Pad for Android.
Kdexploitme
⭐
380
A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.
Cve 2019 0708
⭐
379
3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Swap_digger
⭐
376
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Hershell
⭐
355
Multiplatform reverse shell generator
Isoalloc
⭐
331
A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Sec Admin
⭐
329
分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Docker Hacklab
⭐
324
My personal hacklab, create your own.
Ropium
⭐
314
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
Awesome Csirt
⭐
312
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
East
⭐
293
Exploits and Security Tools Framework 2.0.1
Badpods
⭐
283
A collection of manifests that will create pods with elevated privileges.
Theo
⭐
263
Ethereum recon and exploitation tool.
Cve 2019 1003000 Jenkins Rce Poc
⭐
254
Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Fdsploit
⭐
251
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Pub
⭐
242
Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb
Telegram Trilateration
⭐
242
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
Pown
⭐
234
Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.
Angularjs Csti Scanner
⭐
234
Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.
Nacs
⭐
230
事件驱动的渗透测试扫描器 Event-driven pentest scanner
Flamecord
⭐
229
The ultimate antibot BungeeCord and Waterfall fork for a Secure and Fast Minecraft or Spigot Network. FlameCord protects your server from bot attacks and exploits with its antibot features. FlameCord also fixes bugs, improves performance and adds new functionalities. Download FlameCord now.🔥
Rfi Lfi Payload List
⭐
224
🎯 RFI/LFI Payload List
Cvemon
⭐
224
Monitoring exploits & references for CVEs
Related Searches
Security Vulnerabilities (12,341)
Laravel Security (11,580)
Php Security (10,611)
Python Security (3,710)
Javascript Security (2,859)
Html Security (2,245)
Python Exploitation (1,611)
Golang Security (1,385)
Security Authentication (906)
C Security (866)
1-100 of 363 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2023 Awesome Open Source. All rights reserved.