Showing 41-60 of 269 projects
A comprehensive information security reference for developers, covering various topics and tools.
A curated list of fuzzing resources for learning fuzzing and initial phases of exploit development.
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework.
Automated all-in-one OS command injection exploitation tool for security researchers and penetration testers.
Fluxion is an AI-powered tool for cybersecurity researchers and penetration testers, focused on evil-twin attacks and captive portal exploits.
Linux kernel exploit collection for penetration testing and research
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang.
A large-scale internal network scanning tool with PowerShell and Cobalt Strike plugins, supporting various protocols and features for penetration testing.
A collection of tips and techniques for bug bounty hunting and security research.
NullArray/AutoSploit is an automated mass exploiter tool for penetration testing and security research.
Adversary simulation and Red teaming platform with AI capabilities for security researchers and penetration testers.
An open-source security tool for automating XSS scanning and exploiting, focused on bugbounty and devsecops.
This repository provides a collection of tools and techniques for attacking and defending Active Directory using modern adversary tradecraft.
A Python-based tool to suggest Windows exploits based on installed updates and patches.
Device activity tracker with phone number analysis
This PoC exploits a vulnerability to bypass Xiaomi's HyperOS community restrictions for bootloader unlocking.
A comprehensive guide to Capture The Flag (CTF) competitions for security and hacking enthusiasts.
A tool for searching for ROP gadgets in binary files to facilitate exploitation.
A collection of exploit scripts for vulnerabilities in various web applications and frameworks.
A comprehensive security scanner written in Go, supporting port scanning, protocol detection, fingerprinting, and brute-force attacks.
Get weekly updates on trending AI coding tools and projects.