#
exploit
Here are 294 public repositories matching this topic...
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
training
exploit
hackers
hacking
cybersecurity
penetration-testing
exploits
vulnerability
awesome-list
video-course
hacker
vulnerability-management
vulnerability-identification
vulnerability-scanners
vulnerability-assessment
ethical-hacking
awesome-lists
exploit-development
ethicalhacking
hacking-series
-
Updated
Jun 8, 2020 - Python
ctrlsam
commented
Nov 10, 2019
The Chinese translated version of the README is well out of date, last updated 2 years ago.
The current English README needs to be translated to replace this old one, or to be removed.
.github\.translations\README-zh.md
Open
README translations
6
GEF - GDB Enhanced Features for exploit devs & reversers
python
linux
debugging
exploit
reverse-engineering
gdb
pwn
ctf
ida-pro
binary-ninja
malware-analysis
exploit-development
-
Updated
Jun 7, 2020 - Python
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
-
Updated
Jan 21, 2020 - Python
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
-
Updated
May 21, 2017 - Python
pentest framework
docker
security-audit
exploit
network
proxy
scanner
phishing
hacking
xss
sniffer
packet-analyser
packet-parsing
brute-force
packet-processing
denial-of-service
pentest
fuzzer
packet-generator
spoof
man-in-the-middle
-
Updated
Feb 21, 2019 - Python
Vulnerability Labs for security analysis
-
Updated
Nov 2, 2018 - Python
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
drupal
exploit
solr
nexus
tomcat
poc
vulnerability
webshell
exp
weblogic
struts2-exp
getshell
cve-2020-1938
cve-2020-2551
cve-2020-2555
cve-2020-10199
cve-2020-10204
cve-2020-2883
cve-2020-11444
cve-2020-17558
-
Updated
Jun 1, 2020 - Python
Open
Invalid method
1
Ttech
commented
Apr 7, 2018
There appears to be a broken method in hash extend that is not valid due to it missing a def ():
In addition to this, there appears to be no body for the method.
shell
exploit
interactive
assembly
architecture
asm
assembler
keystone
capstone
pwn
ctf
shellcode
syscalls
exploitation
disassembly
dsm
syscall-table
dissassembler
shellcoding
common-shellcodes
-
Updated
Feb 27, 2019 - Python
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
dns
exploit
ftp
scanner
hacking
xss
python3
aiohttp
cloudflare
asyncio
sqli
vulnerability
pentesting
blackarch
vulnerability-scanners
lfi
metasploit
d0rk
trawling
toxin
-
Updated
Aug 14, 2019 - Python
Collection of things made during my OSCP journey
python
c
bash
exploit
scripts
vbscript
batch-script
privilege-escalation
buffer-overflow
oscp
privesc
privilege-escalation-exploits
oscp-journey
-
Updated
Feb 22, 2018 - Python
K8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
mysql
security
exploit
ftp
scanner
ipc
smb
oracle
hacking
password
subdomain
wmi
poc
mssql
pentest
crack
portscan
cobalt-strike
getshell
netscan
-
Updated
Dec 25, 2019 - Python
An IDA Pro plugin to examine the glibc heap, focused on exploit development
-
Updated
Mar 29, 2020 - Python
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
android
hack
backdoor
adb
exploit
hacking
android-device
rat
remote-shell
post-exploitation
android-debug-bridge
kali-linux
exploitation-framework
remote-access
android-rat
hacking-tools
android-hacking
android-hack
android-exploit
entynetproject
-
Updated
Jun 6, 2020 - Python
Blueborne CVE-2017-0785 Android information leak vulnerability
-
Updated
Sep 23, 2017 - Python
An exploit for Apache Struts CVE-2017-5638
-
Updated
May 21, 2018 - Python
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
-
Updated
Feb 10, 2020 - Python
hack tools
javascript
python
tools
hack
exploit
perl
injection
hacking
vulnerability
vulnerability-databases
hacks
hacking-tool
vulnerability-scanners
0day
sqlinjection
zeroday
vulnerability-web
2020
-
Updated
Jun 4, 2020 - Python
-
Updated
Mar 29, 2019 - Python
An interactive multi-user web JS shell
-
Updated
Dec 8, 2019 - Python
An exploit for Apache Struts CVE-2018-11776
-
Updated
Aug 26, 2018 - Python
Improve this page
Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."
The
constgreptool could probably be a bit faster. I'm not sure what's making it so slow at the moment. It shouldn't take ~2 seconds to look up a value.