Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation attacker
attacker
x
exploitation
x
14 search results found
Labs
⭐
939
Vulnerability Labs for security analysis
Corscanner
⭐
701
Fast CORS misconfiguration vulnerabilities scanner🍻
Xsschef
⭐
486
Chrome extension Exploitation Framework
Cve 2017 11882
⭐
464
Proof-of-Concept exploits for CVE-2017-11882
Subaru Starlink Research
⭐
405
Subaru StarLink persistent root code execution.
Daily Info
⭐
280
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Insecure Firebase Exploit
⭐
154
A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase db.
Leaky Leaky
⭐
152
[PATCHED] Exploit that allows one to authenticate as any user in Minecraft
Mosquito
⭐
143
XSS exploitation tool - access victims through HTTP proxy
Apache Superset Remote Code Execution Poc Cve 2018 8021
⭐
102
CVE-2018-8021 Proof-Of-Concept and Exploit
Bodhi
⭐
92
Bodhi - Client-side Vulnerability Playground
Clang Cfi Bypass Techniques
⭐
90
Exploitation techniques to bypass Clang CFI when applied to Chromium
Tcp_exploit
⭐
89
Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secret
Troubleshooter
⭐
87
setroubleshootd xSports
Mose
⭐
72
Post exploitation tool for configuration management servers.
Cve 2017 12615
⭐
67
POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.
Sentinel
⭐
64
Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect your programs against 0-day attacks or publicly known bugs.
Cve 2019 8449
⭐
60
CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Exploits
⭐
49
Real world and CTFs exploiting web/binary POCs.
Secretnet_expl
⭐
44
LPE exploits for Secret Net and Secret Net Studio
Exploit Cve 2016 6515
⭐
44
OpenSSH remote DOS exploit and vulnerable container
Cve 2016 1764
⭐
41
Extraction of iMessage Data via XSS
Xattacker
⭐
39
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Dumpit
⭐
36
An exploit for SHAREit <= v 4.0.38
Dir8xx_poc
⭐
35
Proof-of-Concept exploits for D-Link DIR8xx routers
Cors Exploit Script
⭐
31
Wd Rce
⭐
31
WD My Cloud PoC exploit
Evil Jar
⭐
30
evil jar attack technical post-mortem
Brutus
⭐
30
Botnet targeting Windows machines written entirely in Python & open source security project.
Cve 2020 15906
⭐
27
Writeup of CVE-2020-15906
Poc Cve 2018 0114
⭐
25
This repository contains the POC of an exploit for node-jose < 0.11.0
Blindref
⭐
24
BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework
Asus Smarthome Exploit
⭐
22
ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063
Rose Exploit
⭐
20
Remote kernel exploit for ROSE amateur radio
Offensive Tor Toolkit
⭐
20
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
Browser Exploit Poc
⭐
19
Nhastie
⭐
15
NTLM HTTP Authentication Session Tier Exploit
Hover_with_power
⭐
13
This repo is dedicated to a powerpoint exploit
Winmagic_sd
⭐
12
Technical Write-Up on and PoC Exploit for CVE-2020-11519 and CVE-2020-11520
Cve 2006 6184
⭐
11
This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.
Cve 2017 5638
⭐
10
cve-2017-5638 Vulnerable site sample
Cve 2020 9375
⭐
10
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
Dlsw_exploit
⭐
9
cisco dlsw exploit
Cve 2015 3073
⭐
9
CVE-2015-3073 PoC
Mock Dao Hack
⭐
9
Simplified "DAO" contract and attacker contract to recursively exploit it
Elabftw 1.8.5 Entitycontroller Arbitrary File Upload Rce
⭐
7
eLabFTW 1.8.5 'EntityController' Arbitrary File Upload / RCE (CVE-2019-12185)
Vulnexipy
⭐
7
Vulnerabilities exploitation examples, python
Cve 2017 5638
⭐
7
Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header
Exploitingformatstringvulnerabilities
⭐
6
Research project on Automating Exploitation on Format String Vulnerabilities
Basic And Low Level Python Network Attacks
⭐
6
Basic and low-level Python Network Attacks
Poodle
⭐
6
Working exploit code for the POODLE attack on SSLv3
Firepwner
⭐
5
Exploit for CVE-2015-6357 Cisco FireSIGHT Management Center Certificate Validation Vulnerability
Iot Securitychecker
⭐
5
IoT Security Checker is a framework for automating some IoT-related security checks
Related Searches
Python Exploitation (1,616)
Exploitation Cve (771)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Python Attacker (365)
Exploitation Penetration Testing (353)
Attack Attacker (278)
Java Exploitation (192)
1-14 of 14 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.