A collection of hacking / penetration testing resources to make you better!
-
Updated
Oct 10, 2020
{{ message }}
A collection of hacking / penetration testing resources to make you better!
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
CTF framework and exploit development library
This repository contains several applications, demonstrating the Meltdown bug.
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
GEF - GDB Enhanced Features for exploit devs & reversers
A collection of links related to Linux kernel security and exploitation
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
大型内网渗透扫描器&Cobalt Strike,Ladon7.2内置94个模块,包含信息收集/存活主机/IP扫描/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、SMBGhost、Weblogic、ActiveMQ、Tomcat、Struts2系列,密码口令爆破(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB、Netbios、LDAP、SmbHash、WmiHash、Winrm),远程执行命令(wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Advanced vulnerability scanning with Nmap NSE
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
A container repository for my public web hacks!
Reverse Shell as a Service
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
My proof-of-concept exploits for the Linux kernel
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
pentest framework
Vulnerability Labs for security analysis
PegaSwitch is an exploit toolkit for the Nintendo Switch
I've tried launching this from the .exe in the zip file download and by installing it via the Installer.msi both keep giving me the "not a valid Win32 application" message shown in the screenshot attached here. I'm running Windows XP on Parallels Desktop 14 on a Mac Mini with a 3GHz Intel Core i7 and 16GB of RAM so it isn't an issue of hardware compatibility or at least it shouldn't be. If anyone
There appears to be a broken method in hash extend that is not valid due to it missing a def ():
In addition to this, there appears to be no body for the method.
Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.
To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant