Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation cybersecurity
cybersecurity
x
exploitation
x
21 search results found
H4cker
⭐
15,693
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Defaultcreds Cheat Sheet
⭐
5,023
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Phonesploit Pro
⭐
3,899
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Computer Science Resources
⭐
2,227
A list of resources in different fields of Computer Science
Mona
⭐
1,571
Corelan Repository for mona.py
A Red Teamer Diaries
⭐
1,294
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Awesome List Of Secrets In Environment Variables
⭐
722
🦄🔒 Awesome list of secrets in environment variables 🖥️
Autopwn Suite
⭐
636
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
Cve 2021 44228 Poc Log4j Bypass Words
⭐
611
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
List Infosec Encyclopedia
⭐
556
A list of information security related awesome lists and other resources.
Webmap
⭐
451
WebMap-Nmap Web Dashboard and Reporting
Hivenightmare
⭐
410
Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
Awesome List
⭐
365
Cybersecurity oriented awesome list
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Hackingtoolkit
⭐
220
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
Allinfosecnews_sources
⭐
212
A list of online news & info sources in the InfoSec/Cybersecurity space
Handbook
⭐
196
A living document for penetration testing and offensive security.
Tryhackme Ctf
⭐
178
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Patrowlhears
⭐
150
PatrowlHears - Vulnerability Intelligence Center / Exploits
Secmon
⭐
148
SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.
Writeups
⭐
133
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Empirectf
⭐
123
EmpireCTF – write-ups, capture the flag, cybersecurity
Infosec And Hacking Scripts
⭐
118
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
Awesome Malware
⭐
118
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Prismatica
⭐
99
Responsive Command and Control System
Slowloris
⭐
89
Asynchronous Python implementation of SlowLoris DoS attack
Lfitester
⭐
89
LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.
Cve 2022 0337 Poc Google Chrome Microsoft Edge Opera
⭐
79
🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
Cybersecurity Resources
⭐
73
Resources for learning about cybersecurity and CTFs
Archive
⭐
65
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Dockerexploit
⭐
50
Docker Remote API Scanner and Exploit
Hack4squad
⭐
49
💀 A bash hacking and scanning framework
Cve 2023 6553
⭐
49
Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution
Reosploit
⭐
39
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Blindpie
⭐
37
Automatically exploit time-based blind SQL injection vulnerabilities.
Pyfud
⭐
36
CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)
Cyberqueens
⭐
29
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Cve 2018 4407
⭐
29
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Cloak And Dagger
⭐
19
An overlay attack example
Fenix Vm
⭐
19
Backend logic implementation for Vulnerability Management System
Metasploit Tutorial
⭐
15
👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.
Cve 2022 28368
⭐
14
Dompdf RCE PoC Exploit - CVE-2022-28368
Defconarsenaltools
⭐
11
Defcon Arsenal Tools (DArT) is a curation of tools presented at DEF CON, the world's largest hacker con.
Windows Exploit Suggester 2
⭐
11
A tool to recommend available exploits for Windows Operating Systems
Cve 2023 27163
⭐
11
Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)
Fudransome
⭐
10
Generate FUD Ransomeware For Windows, Linux and MAC OS
Flame Sourcecode
⭐
9
Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.
Expkit
⭐
9
A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reusable building-blocks like encryption or obfuscation. Mirrors: https://gitlab.com/0xCCF4/expkit . Create issues and merge request on gitlab.
Fuzzout
⭐
9
Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
Exploitableapp
⭐
7
A .NET core project for web based pen testing
Vise
⭐
7
A search engine on information delivered by OSINT sources to support Vulnerability Assessment
Cybersec Writeups
⭐
7
That's a repo where I'll upload writeups for different topics related to cybersecurity.
Beryl
⭐
6
initial access payload injector through uac PE bypass windows defender
Picoctf 2017 Write Up
⭐
6
picoCTF is CMU (Carnegie Mellon University) CYBERSECURITY COMPETITION. picoCTF is where you reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. This repo contains solutions to the 2017 problems.
Buffer Overflow
⭐
6
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
Egebalci
⭐
6
Sub Ringan Framework
⭐
5
Tool for automate bug hunting process 🔍 --> 🍭
Security Resources
⭐
5
Archive of Security Resources - Trainings, meetups, Links
Cross Site Scripting
⭐
5
🐞 Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's browsers.
Ad
⭐
5
Microsoft Windows Active Directory
Attackmate
⭐
5
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
Cve 2023 44487
⭐
5
A python based exploit to test out rapid reset attack (CVE-2023-44487)
Exploitflow
⭐
5
A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.
Related Searches
Python Exploitation (1,616)
Exploitation Cve (771)
Python Cybersecurity (718)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Security Cybersecurity (402)
Exploitation Penetration Testing (353)
1-21 of 21 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.