• Stars
    star
    1
  • Language
    HTML
  • Created over 7 years ago
  • Updated over 6 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Reverse Engineering Tutorial Files from Lena Course

More Repositories

1

ShellPop

Pop shells like a master.
Python
1,440
star
2

FakePip

Pip install exploit package
Python
150
star
3

CVE-2019-0841-BYPASS

A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.
C++
60
star
4

CVE-2018-1000001

glibc getcwd() local privilege escalation compiled binaries
C
32
star
5

Shellkiller

A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.
Shell
27
star
6

NamedPipes

Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.
C#
16
star
7

CVE-2016-2098

Ruby On Rails unrestricted render() exploit
Go
16
star
8

-CVE-2017-9805

Exploit script for Apache Struts2 REST Plugin XStream RCE (β€ŽCVE-2017-9805)
Python
15
star
9

CVE-2019-1064

CVE-2019-1064 Local Privilege Escalation Vulnerability
C#
12
star
10

TelePreter

Telegram-based PowerShell Runspace Host
C#
11
star
11

CVE-2018-12613

PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit
PowerShell
10
star
12

CVE-2016-10033

PHPMailer < 5.2.18 Remote Code Execution Exploit
Go
7
star
13

XXE

My own repository used for testing XXE vulnerabilities in a more automated way.
Python
6
star
14

CVE-2017-5638

Struts02 s2-045 exploit program
Go
5
star
15

CVE-2018-10517

CMS Made Simple 2.2.7 RCE exploit
PowerShell
4
star
16

0x00-0x00.github.io

Ruby
3
star
17

shemutils

Pythonic multi-task library of encryption, database, logging and checksum.
Python
3
star
18

ctf_tools

Tools we (Watchers) use for CTF wargames.
C
3
star
19

CVE-2015-3224

Modification of Metasploit module for RCE in Ruby-On-Rails Console CVE-2015-3224
Ruby
2
star
20

CVE-2014-6271

Shellshock exploitation script that is able to upload and RCE using any vector due to its versatility.
Python
2
star
21

CVE-2018-10949

Zimbra Collaboration Suite Username Enumeration
Python
2
star
22

gadreel-bot

Telegram bot to help with task management and CTF wargames
Python
2
star
23

router_attack

wireless security audit repository
Python
2
star
24

decryptor

A substitution cipher decryptor that uses the operator (user) to decrypt the cipher on-the-fly.
Python
1
star
25

asyncspider

A URL brute-forcer to find hidden files from a target URL. AsyncIO.
Python
1
star
26

CTF_SecurityWeekend

Data for FATEC's 1st SecurityWeekend CTF
1
star
27

hashfind

A simple program to request to decrypthash.com to decrypt the hash given by the user.
Python
1
star
28

crypt

Crypt is a cryptography tool to protect all kinds of data using AES-256 and RSA-4096 algorithms.
Python
1
star
29

shredder

C program to erase files securely overwritting data with random patterns.
C
1
star
30

CVE-2018-7422

Wordpress plugin Site-Editor v1.1.1 LFI exploit
PowerShell
1
star
31

nichide

NicHide is a pure-C program to hide your NIC hardware address.
C
1
star
32

autobackup

C program to handle rsync and SimplePush notifications easily for my own servers.
C
1
star
33

shell_scripts

My own shell scripts used for management.
Shell
1
star
34

proxypwn

ProxyPwn is a scanner and tunneler for open proxies.
Python
1
star
35

netcracker

WiFi auditing tool to monitor, capture and crack WPA handshakes.
Python
1
star
36

CVE-2018-15131

Zimbra Collaboration Suite Username Enumeration
Python
1
star
37

pybackdoor

poc backdoor using python and threading
C++
1
star
38

netwatch

NetWatch is a tool to monitor network hosts TCP ports, uptime and visualize scan logs.
Shell
1
star