COLLECTED BY
Organization:
Internet Archive
Focused crawls are collections of frequently-updated webcrawl data from narrow (as opposed to broad or wide) web crawls, often focused on a single domain or subdomain.
The Wayback Machine - https://web.archive.org/web/20211124013401/https://github.com/topics/exploit
Here are
1,262 public repositories
matching this topic...
A collection of hacking / penetration testing resources to make you better!
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Updated
Nov 23, 2021
Jupyter Notebook
CTF framework and exploit development library
Updated
Nov 23, 2021
Python
windows-kernel-exploits Windows平台提权漏洞集合
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Updated
Nov 17, 2021
Java
linux-kernel-exploits Linux平台提权漏洞集合
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Updated
Nov 16, 2021
Python
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Updated
Oct 30, 2021
PowerShell
This repository contains several applications, demonstrating the Meltdown bug.
A collection of links related to Linux kernel security and exploitation
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Updated
Nov 23, 2021
PowerShell
⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
Updated
Apr 4, 2021
Python
大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Windows Exploit Suggester - Next Generation
Updated
Nov 18, 2021
Python
Advanced vulnerability scanning with Nmap NSE
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
Updated
Jan 21, 2020
Python
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能
Updated
Nov 15, 2021
Python
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Updated
Oct 10, 2021
Jupyter Notebook
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
A container repository for my public web hacks!
Updated
Oct 14, 2021
JavaScript
The best tool for finding one gadget RCE in libc.so.6
Updated
Sep 18, 2021
Ruby
Updated
Sep 7, 2020
Python
Reverse Shell as a Service
Updated
Oct 20, 2020
JavaScript
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Updated
Aug 14, 2021
Python
My proof-of-concept exploits for the Linux kernel
Notes about attacking Jenkins servers
Updated
Nov 23, 2021
Python
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Improve this page
Add a description, image, and links to the
exploit
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
exploit
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant