Trending repositories for topic exploits
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有11wPOC,已校验有效性并去重)
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
A list of online news & info sources in the InfoSec/Cybersecurity space
scalpel是一款命令行漏洞扫描工具,支持深度参数注入,拥有一个强大的数据解析和变异算法,可以将常见的数据格式(json, xml, form等)解析为树结构,然后根据poc中的规则,对树进行变异,包括对叶子节点和树结构 的变异。变异完成之后,将树结构还原为原始的数据格式。
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collect...
:palm_tree:Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有11wPOC,已校验有效性并去重)
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
A list of online news & info sources in the InfoSec/Cybersecurity space
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
scalpel是一款命令行漏洞扫描工具,支持深度参数注入,拥有一个强大的数据解析和变异算法,可以将常见的数据格式(json, xml, form等)解析为树结构,然后根据poc中的规则,对树进行变异,包括对叶子节点和树结构 的变异。变异完成之后,将树结构还原为原始的数据格式。
Community curated list of templates for the nuclei engine to find security vulnerabilities.
📦 Make security testing of K8s, Docker, and Containerd easier.
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collect...
:palm_tree:Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有11wPOC,已校验有效性并去重)
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
A guide on how to fix most common bugs that can be exploited to bring your server to its knees.
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
A list of resources in different fields of Computer Science
A list of online news & info sources in the InfoSec/Cybersecurity space
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
scalpel是一款命令行漏洞扫描工具,支持深度参数注入,拥有一个强大的数据解析和变异算法,可以将常见的数据格式(json, xml, form等)解析为树结构,然后根据poc中的规则,对树进行变异,包括对叶子节点和树结构 的变异。变异完成之后,将树结构还原为原始的数据格式。
Advisories, proof of concept files and exploits that have been made public by @pedrib.
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collect...
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
A guide on how to fix most common bugs that can be exploited to bring your server to its knees.
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有11wPOC,已校验有效性并去重)
A list of online news & info sources in the InfoSec/Cybersecurity space
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
📦 Make security testing of K8s, Docker, and Containerd easier.
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
scalpel是一款命令行漏洞扫描工具,支持深度参数注入,拥有一个强大的数据解析和变异算法,可以将常见的数据格式(json, xml, form等)解析为树结构,然后根据poc中的规则,对树进行变异,包括对叶子节点和树结构 的变异。变异完成之后,将树结构还原为原始的数据格式。
Advisories, proof of concept files and exploits that have been made public by @pedrib.
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
A list of resources in different fields of Computer Science
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collect...
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有11wPOC,已校验有效性并去重)
A list of resources in different fields of Computer Science
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
OpenClarity is an open source tool built to enhance security and observability of cloud native applications and infrastructure
The EXCLUSIVE Collection of 40,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collect...
A list of online news & info sources in the InfoSec/Cybersecurity space
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
A guide on how to fix most common bugs that can be exploited to bring your server to its knees.
RomBuster is a router exploitation tool that allows to disclosure network router admin password.
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有11wPOC,已校验有效性并去重)
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
A guide on how to fix most common bugs that can be exploited to bring your server to its knees.
Curated list of awesome exploits/hacks for school (Proxy, Game Hacks, etc)
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
A list of online news & info sources in the InfoSec/Cybersecurity space
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
This custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
A collection of Discord hacks, exploits & tools that is completely made using NodeJS.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Modular penetration testing platform that enables you to write, test, and execute exploit code.
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
Community curated list of templates for the nuclei engine to find security vulnerabilities.
RomBuster is a router exploitation tool that allows to disclosure network router admin password.
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有11wPOC,已校验有效性并去重)
Community curated list of templates for the nuclei engine to find security vulnerabilities.
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有11wPOC,已校验有效性并去重)
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
The EXCLUSIVE Collection of 40,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
A list of resources in different fields of Computer Science
OpenClarity is an open source tool built to enhance security and observability of cloud native applications and infrastructure
:palm_tree:Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collect...
A collection of Server-Side Prototype Pollution gadgets and exploits
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
RomBuster is a router exploitation tool that allows to disclosure network router admin password.
A collection of Server-Side Prototype Pollution gadgets and exploits
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
A guide on how to fix most common bugs that can be exploited to bring your server to its knees.
The EXCLUSIVE Collection of 40,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
Unguard is an insecure cloud-native microservices demo application.
A list of online news & info sources in the InfoSec/Cybersecurity space
VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities
Curated list of awesome exploits/hacks for school (Proxy, Game Hacks, etc)
PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282
CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and other Misc problems.
A collection of Discord hacks, exploits & tools that is completely made using NodeJS.
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
* READ THE README FOR INFO!! * Incoming Tags- z score statistics,find mean median mode statistics in ms excel,variance,standard deviation,linear regression,data processing,confidence intervals,averag...