-
Updated
Feb 12, 2022 - Python
#
exploitation
Here are 414 public repositories matching this topic...
Automatic SQL injection and database takeover tool
python
database
detection
sql-injection
pentesting
exploitation
sqlmap
takeover
vulnerability-scanner
A collection of hacking tools, resources and references to practice ethical hacking.
security
roadmap
hacking
penetration-testing
pentesting
post-exploitation
pentest
exploitation
hacking-tool
frameworks
information-gathering
web-hacking
hacktools
-
Updated
Jan 13, 2022
fsociety Hacking Tools Pack – A Penetration Testing Framework
python
network
desktop
finder
brute-force-attacks
post-exploitation
exploitation
port-scanning
information-gathering
web-hacking
fsociety
penetration-testing-framework
fsociety-hacking
-
Updated
Nov 2, 2021 - Python
Course materials for Modern Binary Exploitation by RPISEC
-
Updated
Dec 9, 2021 - C
Automated All-in-One OS Command Injection Exploitation Tool.
python
opensource
detection
pentesting
bugbounty
exploitation
command-injection
vulnerability-scanner
-
Updated
Feb 11, 2022 - Python
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
windows
security
attack
active-directory
hacking
cheatsheet
enumeration
activedirectory
penetration-testing
cheat
pentesting
exploitation
hacking-tool
privilege-escalation
cheat-sheet
hacking-tools
windows-active-directory
active-directory-cheatsheet
active-directory-exploitation
hacking-cheasheet
-
Updated
Jan 2, 2022
Automation for internal Windows Penetrationtest / AD-Security
automation
powershell
pentesting
recon
exploitation
privilege-escalation
pentest-tool
redteam
powersploit
adsecurity
-
Updated
Jan 12, 2022 - PowerShell
File upload vulnerability scanner and exploitation tool.
-
Updated
Jan 4, 2021 - Python
渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
-
Updated
Sep 24, 2021 - Python
Automatic SSRF fuzzer and exploitation tool
-
Updated
Oct 27, 2021 - Python
HackSys Extreme Vulnerable Windows Driver
-
Updated
Dec 6, 2021 - C
The Offensive Manual Web Application Penetration Testing Framework.
osint
enumeration
highlight
scanning
exploitation
vulnerability-detection
web-penetration-testing
intelligence-gathering
web-application-security
comprehensive-web
reconnaissance
footprinting
vulnerability-analysis
comprehensive
web-fuzzer
scanning-enumeration
tidos-framework
-
Updated
Feb 12, 2021 - Python
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
-
Updated
Jan 29, 2022 - Python
iOS/macOS/Linux Remote Administration Tool
macos
ios
reverse-shell
jailbreak
exploitation
information-security
meterpreter
pentest-scripts
metasploit
remote-admin-tool
pentest-tool
-
Updated
Mar 25, 2021 - Objective-C
hackers
hacking
resources
owasp
penetration-testing
exploitation
youtube-channel
web-hacking
vulnerable-applications
learning-hacking
-
Updated
Dec 1, 2021
ajakk
commented
Feb 12, 2022
Each of the attached files (when un-gzipped) produce memory leaks, one example:
$ ./binrz/rizin/rizin -Aq ~/Downloads/id\ 000009\,sig\ 06\,src\ 012103+009495\,time\ 506124955\,op\ splice\,rep\ 8
Undefined type in free_object (0)
Undefined type in get_object (0x7d)
Undefined type in get_object (0x0)
Undefined type in get_object (0x0)
Undefined type in get_object (0x1b)
Undefined typ
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
windows
security
powershell
active-directory
hacking
cheatsheet
enumeration
penetration-testing
infosec
pentesting
exploitation
hacking-tool
privilege-escalation
cheat-sheet
hacking-tools
windows-active-directory
active-directory-cheatsheet
active-directory-exploitation
hacking-cheasheet
-
Updated
Nov 14, 2020 - PowerShell
How to exploit a double free vulnerability in 2021. 'Use After Free for Dummies'
tutorial
binary
pwn
heap
ctf
lock-free
walkthrough
exploitation
microarchitecture
use-after-free
double-free
-
Updated
Oct 31, 2021 - Python
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
wordpress
video
drupal
exploit
scanner
hacking
joomla
prestashop
pentest
exploitation
vulnerability-detection
hacking-tool
security-scanner
vulnerability-assessment
lokomedia
security-tools
vulnerability-scanner
vulnerability-exploit
website-vulnerability-scanner
wp-scanner
auto-exploiter
-
Updated
Jan 22, 2022 - Perl
Awesome tools to exploit Windows !
powershell
exploitation
powershell-script
windows-hacking
windows-machine
exploiting-windows
post-exploitation-powershell
powershell-payload
-
Updated
Oct 25, 2016
Advanced dork Search & Mass Exploit Scanner
linux
shell
security
data
tools
system
server
engine
scanner
xss
web-application
sqli
exploitation
ports
portscan
vulnerability-scanners
dork
lfi
rfi
mass-exploitation-scanner
-
Updated
Sep 4, 2021 - Perl
Open
Invalid method
1
Ttech
commented
Apr 7, 2018
There appears to be a broken method in hash extend that is not valid due to it missing a def ():
In addition to this, there appears to be no body for the method.
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
graphql
security
penetration-testing
vulnerability
exploitation
graphql-security
damn-vulnerable
damn-vulnerable-web-application
-
Updated
Jan 15, 2022 - JavaScript
Linux Binary Exploitation
linux
tutorial
binaries
stackoverflow
buffer-overflow-attack
vulnerabilities
exploitation
consolidation
bufferoverflow
heap-exploitation
format-string-attack
ret2libc
shellcode-injector
return-to-libc
global-offset-table
overriding-got
got-spawning-shell
-
Updated
Jun 15, 2021 - C
wide range mass audit toolkit
-
Updated
Oct 3, 2018 - Python
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
linux
iot
embedded
kernel
paper
linux-kernel
fuzzing
exploitation
vulnerability-detection
mitigations
rca
sanitizer
directed-fuzzing
hybrid-fuzzing
fuzzing-binaries
guided-fuzzing
root-cause
-
Updated
Jan 1, 2022
shell
exploit
interactive
assembly
architecture
asm
assembler
keystone
capstone
pwn
ctf
shellcode
syscalls
exploitation
disassembly
dsm
syscall-table
dissassembler
shellcoding
common-shellcodes
-
Updated
Feb 26, 2021 - Python
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
windows
security
exploit
windows-10
exploits
vulnerability
antivirus
security-vulnerability
exploitation
windows-7
antivirus-evasion
process-hollowing
windows-defender
exploit-development
process-doppelganging
exploit-framework
process-migration
process-herpaderping
-
Updated
Jan 10, 2022 - C++
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
-
Updated
Sep 30, 2020 - C++
Improve this page
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant