A collection of hacking / penetration testing resources to make you better!
-
Updated
May 14, 2020
A collection of hacking / penetration testing resources to make you better!
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
The Chinese translated version of the README is well out of date, last updated 2 years ago.
The current English README needs to be translated to replace this old one, or to be removed.
.github\.translations\README-zh.md
This repository contains several applications, demonstrating the Meltdown bug.
To facilitate easier studying of these types of vulnerabilities the tool scaffolding should be able to instrument itself to generate ASCII diagrams of payload object-graphs (similar to this) and deserialization code execution call-trees (similar to [this](https://gist.github.com/frohoff/24af7913611f8406ea
GEF - GDB Enhanced Features for exploit devs & reversers
A collection of links related to Linux kernel exploitation
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
大型内网渗透扫描器&Cobalt Strike,Ladon6.6内置74个模块,包含信息收集/存活主机/IP扫描/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、SMBGhost、Weblogic、ActiveMQ、Tomcat、Struts2系列,密码口令爆破(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB、LDAP、SmbHash、WmiHash、Winrm),远程执行命令(wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Advanced vulnerability scanning with Nmap NSE
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
A container repository for my public web hacks!
Reverse Shell as a Service
My proof-of-concept exploits for the Linux kernel
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
pentest framework
Vulnerability Labs for security analysis
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
I feel like our IPC API can take a little getting used to, and there is very little public documentation; pretty much all anyone has to go off of are the few included scripts.
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
There appears to be a broken method in hash extend that is not valid due to it missing a def ():
In addition to this, there appears to be no body for the method.
I've tried launching this from the .exe in the zip file download and by installing it via the Installer.msi both keep giving me the "not a valid Win32 application" message shown in the screenshot attached here. I'm running Windows XP on Parallels Desktop 14 on a Mac Mini with a 3GHz Intel Core i7 and 16GB of RAM so it isn't an issue of hardware compatibility or at least it shouldn't be. If anyone
Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.
To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."
The
constgreptool could probably be a bit faster. I'm not sure what's making it so slow at the moment. It shouldn't take ~2 seconds to look up a value.