Trending repositories for topic exploitation
A collection of hacking tools, resources and references to practice ethical hacking.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Articles and tools related to research in the Apple environment (mainly macOS).
A container analysis and exploitation tool for pentesters and engineers.
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for an...
IDA Pro plugin to examine the glibc heap, focused on exploit development
Articles and tools related to research in the Apple environment (mainly macOS).
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试
A container analysis and exploitation tool for pentesters and engineers.
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for an...
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
An XSS exploitation command-line interface and payload generator.
IDA Pro plugin to examine the glibc heap, focused on exploit development
DARKARMY Hacking Tools Pack - A Penetration Testing Framework .
A collection of hacking tools, resources and references to practice ethical hacking.
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
A collection of hacking tools, resources and references to practice ethical hacking.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A container analysis and exploitation tool for pentesters and engineers.
Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试
Articles and tools related to research in the Apple environment (mainly macOS).
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
Articles and tools related to research in the Apple environment (mainly macOS).
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试
Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯
A container analysis and exploitation tool for pentesters and engineers.
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
DARKARMY Hacking Tools Pack - A Penetration Testing Framework .
MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
A collection of manifests that will create pods with elevated privileges.
Hourly updated database of exploit and exploitation reports
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A collection of hacking tools, resources and references to practice ethical hacking.
Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
UNIX-like reverse engineering framework and command-line toolset.
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for an...
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
A container analysis and exploitation tool for pentesters and engineers.
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
Articles and tools related to research in the Apple environment (mainly macOS).
Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试
Some Useful Tricks for Pentest Android and iOS Apps
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for an...
This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows/Linux hacking.
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试
Articles and tools related to research in the Apple environment (mainly macOS).
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
A collection of hacking tools, resources and references to practice ethical hacking.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
"Randar" is an exploit for Minecraft which uses LLL lattice reduction to crack the internal state of an incorrectly reused java.util.Random in the Minecraft server, then works backwards from that to l...
UNIX-like reverse engineering framework and command-line toolset.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Automation for internal Windows Penetrationtest / AD-Security
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows/Linux hacking.
"Randar" is an exploit for Minecraft which uses LLL lattice reduction to crack the internal state of an incorrectly reused java.util.Random in the Minecraft server, then works backwards from that to l...
Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试
Some Useful Tricks for Pentest Android and iOS Apps
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
Repository with quick triggers to help during Pentest in an Active Directory environment.
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for an...
Master cybersecurity skills with this TryHackMe free path, includes a collection of my write-ups, solutions and progress tracking.
An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.