-
Updated
May 1, 2022 - Jupyter Notebook
#
exploits
Here are 298 public repositories matching this topic...
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
training
exploit
hackers
hacking
cybersecurity
penetration-testing
exploits
vulnerability
awesome-list
video-course
hacker
vulnerability-management
vulnerability-identification
vulnerability-scanners
vulnerability-assessment
ethical-hacking
awesome-lists
exploit-development
ethicalhacking
hacking-series
Exploitation Framework for Embedded Devices
python
security
embedded
router
scanner
bruteforce
exploits
infosec
router-exploitation-framework
routersploit-framework
dictionary-attack
routersploit
creds
-
Updated
Dec 8, 2021 - Python
3
good first issue
Good for newcomers
Decrypted content of eqgrp-auction-file.tar.xz
-
Updated
May 24, 2017 - Perl
Linux privilege escalation auditing tool
linux-kernel
exploits
kernel-exploitation
hacking-tool
security-tools
linux-exploits
privilege-escalation-exploits
applicable-exploits
published-exploits
-
Updated
Apr 1, 2022 - Shell
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
security
security-audit
scanner
exploits
infosec
pentesting
vulnerability-detection
vulnerability-scanners
vulnerability-assessment
-
Updated
Mar 16, 2021 - Python
linux
docker
kubernetes
blackhat
exploits
k8s
cloud-native
penetration
hacktools
penetration-testing-tools
hitb
k8s-penetration-toolkit
escape-container
-
Updated
Apr 26, 2022 - Go
windows
kernel
tool
exploits
cve
pentest
cve-2020-16898
cve-2020-16938
cve-2020-17087
cve-2021-1732
cve-2020-1054
cve-2021-33739
cve-2021-26868
cve-2021-36934
cve-2021-40444
cve-2021-40449
cve-2021-42287
cve-2021-42278
cve-2021-34486
cve-2022-21882
-
Updated
Apr 25, 2022 - C
A list of resources in different fields of Computer Science (multiple languages)
javascript
python
programming-language
machine-learning
cryptography
database
networking
physics
assembly
regular-expression
mathematics
artificial-intelligence
operating-system
computer
cybersecurity
quantum-computing
exploits
cloud-computing
awesome-list
computervision
-
Updated
Apr 14, 2022
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
sudo
exploits
ctf
cve
pentest
privilege-escalation
oscp
pentest-tool
linux-exploits
oscp-journey
misconfiguration
oscp-tools
oscp-prep
sudo-exploitation
abuse-sudo
-
Updated
Apr 19, 2022 - Shell
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.
bot
crawler
hacking
exploits
vulnerability
pentest
vulnerability-detection
vulnerability-assessment
information-gathering
security-tools
cms-detector
cloudflare-detection
shell-injection
vulnerability-exploit
website-vulnerability-scanner
wp-scanner
auto-exploiter
dorks
detects-vulnerabilities
subdomains-gathering
-
Updated
Mar 30, 2022 - Python
Open
Invalid method
1
Ttech
commented
Apr 7, 2018
There appears to be a broken method in hash extend that is not valid due to it missing a def ():
In addition to this, there appears to be no body for the method.
A Ruby framework designed to aid in the penetration testing of WordPress systems.
-
Updated
Nov 24, 2019 - Ruby
The Correlated CVE Vulnerability And Threat Intelligence Database API
python
threat
exploits
vulnerability
scap
vulnerability-databases
threatintel
cve
oval
vulnerability-detection
vulnerability-identification
vulnerability-scanners
cwe
capec
intelligence-gathering
threat-intelligence
vulnerability-database-entry
threat-intelligence-database
vfeed
common-vulnerability-exposure
-
Updated
May 28, 2021 - Python
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
windows
security
exploit
windows-10
exploits
vulnerability
antivirus
security-vulnerability
exploitation
windows-7
antivirus-evasion
process-hollowing
windows-defender
exploit-development
process-doppelganging
exploit-framework
process-migration
process-herpaderping
-
Updated
Jan 10, 2022 - C++
Find exploit tool
-
Updated
Nov 4, 2020 - Python
kernel privilege escalation enumeration and exploitation framework
-
Updated
Aug 2, 2018 - Python
Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
-
Updated
Jul 26, 2021 - C++
Advisories, proof of concept files and exploits that have been made public by @pedrib.
-
Updated
Mar 30, 2022 - Ruby
A collection of curated Java Deserialization Exploits
-
Updated
May 16, 2021 - Python
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
hack
exploit
ipv6
hacking
penetration-testing
exploits
pentesting
hacks
pentest
magazine
hacking-tool
pentest-tool
hpa
pentesting-networks
hacking-tools
thc
thc-hydra
phreaking
hpav
hacker-choice
-
Updated
Feb 3, 2022 - HTML
for mass exploiting
python
linux
censys
parallelization
exploits
rce
prompt-toolkit
google-search
hacking-tool
mec
weblogic
masscan
zoomeye
cli-ui
baidu-search
ssh-bruteforce
adapted-exploits
-
Updated
Mar 26, 2022 - Python
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
enumeration
exploits
privilege-escalation
privilege-escalation-exploits
container-escape
deepce
docker-enumeration
-
Updated
Nov 18, 2021 - Shell
Repository for information about 0-days exploited in-the-wild.
-
Updated
Apr 30, 2022 - HTML
Improve this page
Add a description, image, and links to the exploits topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the exploits topic, visit your repo's landing page and select "manage topics."
Template / PR Information
Template Validation
I've validated this template locally?
Additional Details (leave it blank if not applicable)
Additional References: