Linux privilege escalation exploit via snapd (CVE-2019-7304)
Support
Quality
Security
License
Reuse
A fun hack that gets Slackbot to force your teammates to work out!
Support
Quality
Security
License
Reuse
glibc offset search for ctf.
Support
Quality
Security
License
Reuse
A collection of android Exploits and Hacks
Support
Quality
Security
License
Reuse
This is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Support
Quality
Security
License
Reuse
Hypervisor Memory Introspection Core Library
Support
Quality
Security
License
Reuse
Sudo Baron Samedit Exploit
Support
Quality
Security
License
Reuse
Read and write process memory in Node.js (Windows API functions exposed via Node bindings)
Support
Quality
Security
License
Reuse
New Hoverboard Firmware Hack. Now written from scratch and generally much better.
Support
Quality
Security
License
Reuse
CMS渗透测试框架-A CMS Exploit Framework
Support
Quality
Security
License
Reuse
针对ctf线下赛流量抓取(php)、真实环境流量抓取分析的工具
Support
Quality
Security
License
Reuse
kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see
Support
Quality
Security
License
Reuse
A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
Support
Quality
Security
License
Reuse
Perfect Blue's CTF Writeups
Support
Quality
Security
License
Reuse
An chroot-like implementation using ptrace.
Support
Quality
Security
License
Reuse
best script for hacking instagram
Support
Quality
Security
License
Reuse
Taint is a PHP extension, used for detecting XSS codes
Support
Quality
Security
License
Reuse
Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.
Support
Quality
Security
License
Reuse
Preimage attack against NeuralHash 💣
Support
Quality
Security
License
Reuse
Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).
Support
Quality
Security
License
Reuse
An intelligence gathering tool for hacking Bluetooth
Support
Quality
Security
License
Reuse
Payload development tool
Support
Quality
Security
License
Reuse
for mass exploiting
Support
Quality
Security
License
Reuse
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Support
Quality
Security
License
Reuse
An Easy / Quick / Cheap Integrated Platform
Support
Quality
Security
License
Reuse
A hyper plugin to provide a flexible GDB GUI frontend with the help of GEF, pwndbg or peda
Support
Quality
Security
License
Reuse
Tool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Support
Quality
Security
License
Reuse
冰蝎 哥斯拉 WebShell bypass
Support
Quality
Security
License
Reuse
Electron JS Browser To Find XSS Vulnerabilities Automatically
Support
Quality
Security
License
Reuse
ReverShellGenerator - A tool to generate various ways to do a reverse shell
Support
Quality
Security
License
Reuse
ROP based CSGO, BF3, BF4 cheat
Support
Quality
Security
License
Reuse
Exploit for zerologon cve-2020-1472
Support
Quality
Security
License
Reuse
A large Linux csgo cheat/hack
Support
Quality
Security
License
Reuse
Execute shell commands on Android.
Support
Quality
Security
License
Reuse
THIS TOOL IS FOR DDOS ATTACK ON PHONE NUMBER YOU CAN USE THIS TOOL ON YOUR KALI LINUX OR TERMUX ALSO IF IS NOT WORK THEN PLEASE CONTACT ME IN "VAIMPIER RITIK" YOUTUBE CHANNEL THANKYOU FOR COMING HERE ......
Support
Quality
Security
License
Reuse
A multifunctional Telegram based Android RAT without port forwarding.
Support
Quality
Security
License
Reuse
All in 1 Bangladeshi Facebook Cloner [ 7/8/9/10/11 DIGIT ]
Support
Quality
Security
License
Reuse
A multifunctional Android RAT with GUI based Web Panel without port forwarding.
Support
Quality
Security
License
Reuse
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Support
Quality
Security
License
Reuse
j
java-deserialization-exploitsby Coalfire-Research
Python 523 Version:Current License: No License (No License)
A collection of curated Java Deserialization Exploits
Support
Quality
Security
License
Reuse
A collection of source code for various botnets.
Support
Quality
Security
License
Reuse
facebook hacking tool for termux or linux 2020
Support
Quality
Security
License
Reuse
Drupal enumeration & exploitation tool
Support
Quality
Security
License
Reuse
RSVP reader for Android.
Support
Quality
Security
License
Reuse
Remote Access Tool
Support
Quality
Security
License
Reuse
:key: WiFi captive portal for ESP8266 for phishing WiFi passwords
Support
Quality
Security
License
Reuse
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
Support
Quality
Security
License
Reuse
P
PS4-4.05-Kernel-Exploitby Cryptogenic
JavaScript 513 Version:Current License: No License (No License)
A fully implemented kernel exploit for the PS4 on 4.05FW
Support
Quality
Security
License
Reuse
Medusa is a speedy, parallel, and modular, login brute-forcer.
Support
Quality
Security
License
Reuse
l
linux-exploit-development-tutorialby hardenedlinux
C 511 Version:Current License: No License (No License)
a series tutorial for linux exploit development to newbie.
Support
Quality
Security
License
Reuse
d
dirty_sockby initstring
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Python 574Updated: 4 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
s
slackbot-workoutby brandonshin
A fun hack that gets Slackbot to force your teammates to work out!
Python 573Updated: 4 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
L
LibcSearcherby lieanu
glibc offset search for ctf.
Shell 573Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
A
Android-Exploitsby sundaysec
A collection of android Exploits and Hacks
HTML 571Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
I
Instagram-Hackerby importCTF
This is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Python 568Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
h
hvmiby hvmi
Hypervisor Memory Introspection Core Library
C 566Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
C
CVE-2021-3156by worawit
Sudo Baron Samedit Exploit
Python 565Updated: 2 y ago License: Permissive (BSD-3-Clause)
Support
Quality
Security
License
Reuse
m
memoryjsby Rob--
Read and write process memory in Node.js (Windows API functions exposed via Node bindings)
C++ 563Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
h
hoverboard-firmware-hackby lucysrausch
New Hoverboard Firmware Hack. Now written from scratch and generally much better.
C 562Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
c
cmsPocby CHYbeta
CMS渗透测试框架-A CMS Exploit Framework
Python 560Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
w
webloggerby wupco
针对ctf线下赛流量抓取(php)、真实环境流量抓取分析的工具
PHP 559Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
k
kctfby google
kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see
Go 559Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
s
spectreby D4stiny
A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
C++ 558Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
c
ctf-writeupsby perfectblue
Perfect Blue's CTF Writeups
Python 557Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
p
prootby termux
An chroot-like implementation using ptrace.
C 557Updated: 2 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
i
instabrute.github.ioby dark-player
best script for hacking instagram
CSS 556Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
t
taintby laruence
Taint is a PHP extension, used for detecting XSS codes
C 556Updated: 4 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
r
rexby angr
Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.
Python 553Updated: 3 y ago License: Permissive (BSD-2-Clause)
Support
Quality
Security
License
Reuse
n
neural-hash-colliderby anishathalye
Preimage attack against NeuralHash 💣
Python 549Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
E
EfsPotatoby zcgonvh
Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).
C# 547Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
b
bluingby fO-000
An intelligence gathering tool for hacking Bluetooth
Python 546Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
S
Support
Quality
Security
License
Reuse
m
Support
Quality
Security
License
Reuse
S
SSRF_Vulnerable_Labby incredibleindishell
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
PHP 539Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
H
H1veby D0g3-Lab
An Easy / Quick / Cheap Integrated Platform
Python 537Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
h
hyperpwnby bet4it
A hyper plugin to provide a flexible GDB GUI frontend with the help of GEF, pwndbg or peda
JavaScript 537Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
0
0d1nby CoolerVoid
Tool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
C 537Updated: 4 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
G
Support
Quality
Security
License
Reuse
X
XSSTRONby RenwaX23
Electron JS Browser To Find XSS Vulnerabilities Automatically
JavaScript 536Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
r
rsgby mthbernardes
ReverShellGenerator - A tool to generate various ways to do a reverse shell
Python 535Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
R
ROP-COMPILERby Speedi13
ROP based CSGO, BF3, BF4 cheat
C++ 535Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
z
zerologonby risksense
Exploit for zerologon cve-2020-1472
Python 534Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
A
AimTuxby AimTuxOfficial
A large Linux csgo cheat/hack
C++ 533Updated: 4 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
A
AndroidShellby jaredrummler
Execute shell commands on Android.
Java 532Updated: 4 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
V
Vaim-smsby VaimpierOfficial
THIS TOOL IS FOR DDOS ATTACK ON PHONE NUMBER YOU CAN USE THIS TOOL ON YOUR KALI LINUX OR TERMUX ALSO IF IS NOT WORK THEN PLEASE CONTACT ME IN "VAIMPIER RITIK" YOUTUBE CHANNEL THANKYOU FOR COMING HERE ......
Python 531Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
D
DogeRatby shivaya-dav
A multifunctional Telegram based Android RAT without port forwarding.
JavaScript 528Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
h
haxorbdby htr-tech
All in 1 Bangladeshi Facebook Cloner [ 7/8/9/10/11 DIGIT ]
Python 526Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
A
AIRAVATby Th30neAnd0nly
A multifunctional Android RAT with GUI based Web Panel without port forwarding.
HTML 525Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
a
attack-scriptsby mitre-attack
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Python 524Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
j
java-deserialization-exploitsby Coalfire-Research
A collection of curated Java Deserialization Exploits
Python 523Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
T
TL-BOTSby threatland
A collection of source code for various botnets.
C 523Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
A
AXOM-FB-HACKby dAYOShACKER505
facebook hacking tool for termux or linux 2020
Python 521Updated: 2 y ago License: Weak Copyleft (MPL-2.0)
Support
Quality
Security
License
Reuse
d
drupwnby immunIT
Drupal enumeration & exploitation tool
Python 520Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
G
GlanceReaderby OnlyInAmerica
RSVP reader for Android.
Java 519Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
L
Support
Quality
Security
License
Reuse
E
ESP8266-Captive-Portalby adamff1
:key: WiFi captive portal for ESP8266 for phishing WiFi passwords
C++ 517Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
D
DDexecby arget13
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
Shell 514Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
P
PS4-4.05-Kernel-Exploitby Cryptogenic
A fully implemented kernel exploit for the PS4 on 4.05FW
JavaScript 513Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
m
medusaby jmk-foofus
Medusa is a speedy, parallel, and modular, login brute-forcer.
C 513Updated: 2 y ago License: Strong Copyleft (GPL-2.0)
Support
Quality
Security
License
Reuse
l
linux-exploit-development-tutorialby hardenedlinux
a series tutorial for linux exploit development to newbie.
C 511Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse