135 Open Source Exploits Software Projects
Free and open source exploits code projects including engines, APIs, generators, and tools.
H4cker 10652 ⭐
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Nullsecuritynet Tools 1570 ⭐
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Computer Science Resources 1631 ⭐
A list of resources in different fields of Computer Science (multiple languages)
Wordpress Exploit Framework 914 ⭐
A Ruby framework designed to aid in the penetration testing of WordPress systems.
Sudo_killer 1433 ⭐
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Dark Lbp Isf 791 ⭐
ISF(Industrial Control System Exploitation Framework)，a exploitation framework based on Python
Roothelper 438 ⭐
A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.
Securitymanageframwork 395 ⭐
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Securityexploits 244 ⭐
This repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits
Arissploit 113 ⭐
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Web_exploit_detector 84 ⭐
The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Csirt 219 ⭐
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Fail2ban.webexploits 92 ⭐
This custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
IOS 10.1.1 Project 0 Exploit Fork 45 ⭐
iOS 10.1.1 Project 0 Exploit Compatible with All arm64 devices for Jailbreak Development
Cve Stockpile 41 ⭐
Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
Pyvfeed 48 ⭐
Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions
Skypedestroyer 19 ⭐
TamperMonkey/GreaseMonkey addon for Skype. Exploits headers and the Skype protocol.
Xattacker 3.0 44 ⭐
X Attacker Tool Website Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells | Sends | Deface | cPanels | Databases All Credits To The Org Owners i Remade The API and added New Exploits To Joomla And Wordpress
Lancer 13 ⭐
Vulnerability assessment tool that utilises several programs to perform a comprehensive analysis of a device or network
Vigilante Toolset 27 ⭐
!!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most tools to work as normal while resolving .onion
Kernelhub 1675 ⭐
:palm_tree:Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Tbms 12 ⭐
Tor-Browser Sandbox for macOS - security tool to reduce tor-browser access to macOS system
Cdk Team Cdk 2012 ⭐
CDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Vulnx 1366 ⭐
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.
Herpaderping 804 ⭐
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Pedrib Poc 489 ⭐
Advisories, proof of concept files and exploits that have been made public by @pedrib.
Rombuster 165 ⭐
RomBuster is a router exploitation tool that allows to disclosure network router admin password.
Poc Exploits 147 ⭐
Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Hatsploit 125 ⭐
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Sdushantha Dora 146 ⭐
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Hatvenom 80 ⭐
HatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Csharp And Infosec 49 ⭐
This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.