Automatic SQL injection and database takeover tool
-
Updated
Aug 18, 2021 - Python
{{ message }}
Automatic SQL injection and database takeover tool
fsociety Hacking Tools Pack – A Penetration Testing Framework
Course materials for Modern Binary Exploitation by RPISEC
Automated All-in-One OS Command Injection Exploitation Tool.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
File upload vulnerability scanner and exploitation tool.
Automation for internal Windows Penetrationtest / AD-Security
渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
HackSys Extreme Vulnerable Windows Driver
Automatic SSRF fuzzer and exploitation tool
The Offensive Manual Web Application Penetration Testing Framework.
iOS/macOS/Linux Remote Administration Tool
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
X Attacker Tool
Currently, there are functions that print something all over the place of librz/core/*.c, e.g. rz_core_analysis_bbs_info_print() or rz_core_analysis_bb_info_print() from librz/core/canalysis.c or rz_core_asm_plugin_print() from librz/core/casm.c.
I suggest to separate "logic" and non-printing API from the printing one, they all should have a _print() suffix and located in the sam
There appears to be a broken method in hash extend that is not valid due to it missing a def ():
In addition to this, there appears to be no body for the method.
Awesome tools to exploit Windows !
wide range mass audit toolkit
Advanced dork Search & Mass Exploit Scanner
Linux Binary Exploitation
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
A collection where my current and future writeups for exploits/CTF will go
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant