Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation information security
exploitation
x
information-security
x
3 search results found
Routersploit
⭐
11,818
Exploitation Framework for Embedded Devices
Red Teaming Toolkit
⭐
8,230
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Traitor
⭐
6,329
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Cve
⭐
5,806
Gather and update all available and newest CVEs with their PoC.
Defaultcreds Cheat Sheet
⭐
5,023
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Xunfeng
⭐
2,946
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Eggshell
⭐
1,589
iOS/macOS/Linux Remote Administration Tool
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Deimosc2
⭐
926
DeimosC2 is a Golang command and control framework for post-exploitation.
Powerzure
⭐
771
PowerShell framework to assess Azure security
Poc
⭐
727
Advisories, proof of concept files and exploits that have been made public by @pedrib.
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Autopwn Suite
⭐
636
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
Ronin
⭐
600
Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositories.
List Infosec Encyclopedia
⭐
556
A list of information security related awesome lists and other resources.
Webmap
⭐
451
WebMap-Nmap Web Dashboard and Reporting
Securitymanageframwork
⭐
421
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Sec Admin
⭐
329
分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Cve 2019 1003000 Jenkins Rce Poc
⭐
254
Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Allinfosecnews_sources
⭐
212
A list of online news & info sources in the InfoSec/Cybersecurity space
Dora
⭐
206
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Handbook
⭐
196
A living document for penetration testing and offensive security.
Reading Material
⭐
195
📚 Stuff to read up
Jiraffe
⭐
178
One stop place for exploiting Jira instances in your proximity
Scanner And Patcher
⭐
145
A Web Vulnerability Scanner and Patcher
Pwnshop
⭐
144
Exploit Development, Reverse Engineering & Cryptography
Pwn Pulse
⭐
131
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Infosec And Hacking Scripts
⭐
118
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
Cve 2022 23808
⭐
110
phpMyAdmin XSS
Shodanz
⭐
110
🔭 A modern, async Ruby gem for Shodan.
Prismatica
⭐
99
Responsive Command and Control System
Infosec Learning Materials
⭐
97
Resource for developing infosec skills for OSCP
Slowloris
⭐
89
Asynchronous Python implementation of SlowLoris DoS attack
Log4j
⭐
74
Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
Hardware Attacks State Of The Art
⭐
67
Microarchitectural exploitation and other hardware attacks.
Cve 2023 22515
⭐
62
CVE-2023-22515: Confluence Broken Access Control Exploit
Ronin Exploits
⭐
59
A Ruby micro-framework for writing and running exploits
Maalik
⭐
54
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Containers
⭐
53
Automated privilege escalation of the world's most popular Docker images.
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Cve 2023 6553
⭐
49
Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution
Sifter
⭐
49
Sifter - All purpose penetration testing op-center
Advancedkeyhacks
⭐
47
API Key/Token Exploitation Made easy.
Cve 2023 29357
⭐
47
Microsoft SharePoint Server Elevation of Privilege Vulnerability
Oscp Omnibus
⭐
46
A collection of resources I'm using while working toward the OSCP
Volana
⭐
39
🌒 Shell command obfuscation to avoid detection systems
Blindpie
⭐
37
Automatically exploit time-based blind SQL injection vulnerabilities.
Journey_to_osce
⭐
30
A curated collection of resources that may be beneficial for anyone pursuing the OSCE.
How To Self Learn Infosec
⭐
24
Ans to the FAQ: How do you self-learn information security?
Remote Code Execution Sample
⭐
24
Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.
Pyparser Cve
⭐
23
Multi source CVE/exploit parser.
Cve 2023 4966
⭐
22
Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
Pentesting
⭐
20
Misc. Public Reports of Penetration Testing and Security Audits.
Fenix Vm
⭐
19
Backend logic implementation for Vulnerability Management System
Lehack19
⭐
19
Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)
Ggtfobins
⭐
17
Get GTFOBins info about a given exploit from the command line
Preparation Guide To Oscp
⭐
14
Journey to Try Harder !!!
Gray Hacker
⭐
12
Defconarsenaltools
⭐
11
Defcon Arsenal Tools (DArT) is a curation of tools presented at DEF CON, the world's largest hacker con.
Fuzzout
⭐
9
Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
Cve 2022 36804 Poc
⭐
7
Bitbucket CVE-2022-36804 unauthenticated remote command execution
Security Studies
⭐
7
Some guides about general topics of information security
Buffer Overflow
⭐
6
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
Tendaspill
⭐
6
An exploitation tool to extract passwords using CVE-2015-5995.
Locksmith
⭐
6
Locksmith is a tool which allow simple way to test several API keys for a bug bounty program
Infosec
⭐
5
infosec stuff
Red Team
⭐
5
The following repo holds all scripts, apps, and documentation for InfoSec Red Team related activities.
Blog
⭐
5
https://strm.sh website source code
Related Searches
Python Exploitation (1,616)
Exploitation Cve (771)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Exploitation Penetration Testing (392)
Python Information Security (342)
Penetration Testing Information Security (281)
1-3 of 3 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.