The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
Top 23 Exploit Open-Source Projects
-
h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
-
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
nuclei-templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Project mention: Script kiddie tools preferred by the hackers of this channel? | /r/hacking | 2023-07-08Check https://github.com/projectdiscovery/nuclei mostly for CVEs.
-
-
-
-
SUDO_KILLER
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
-
-
herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
-
-
-
-
Project mention: Why Isn't a Timer Capable of Preventing Brute Force | /r/AskComputerScience | 2023-04-23
It is possible to brute force logins online, using something like Hydra, but many site already lockout an IP address after X failed login attempts.
-
-
KEV
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
Project mention: Open-Source Detector of CISA's Known Exploitable Vulnerabilities | news.ycombinator.com | 2024-01-15 -
RomBuster
RomBuster is a router exploitation tool that allows to disclosure network router admin password.
-
dora
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found (by sdushantha)
-
Project mention: Possible plugin issue - don't fly above Y=123 in the nether | /r/constantiam | 2023-05-26
Also a heads up, thrown projectiles such as arrows and tridents get removed after 15-25 seconds, I had a lightning generator that uses tridents (and doesn't create lag) and I've watched two tridents disappear. Constantiam is using a plugin called https://github.com/moom0o/AnarchyExploitFixes and it has a module that's meant to prevent snowball lag machines, and it removes any thrown projectile object that isn't an enderpearl (or witherskull). This plugin is also responsible for patching beehive nbt data.
-
-
-
Bookmarklet-Hacks-For-School
* READ THE README FOR INFO!! * Incoming Tags- z score statistics,find mean median mode statistics in ms excel,variance,standard deviation,linear regression,data processing,confidence intervals,average value,probability theory,binomial distribution,matrix,random numbers,error propagation,t statistics analysis,hypothesis testing,theorem,chi square,time series,data collection,sampling,p value,scatterplots,statistics lectures,statistics tutorials,business mathematics statistics,share stock market s
-
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Exploits related posts
- Possible plugin issue - don't fly above Y=123 in the nether
- OSCP priv esc suggestions?
- cve-2023-22809
- CVE-2023-22809
- CVE-2023-22809
- Sudoedit can edit arbitrary files (CVE-2023-22809)
- Nothing new under the Sun - Discovering and exploiting a CDE bug chain
-
A note from our sponsor - WorkOS
workos.com | 18 Apr 2024
Index
What are some of the best open-source Exploit projects? This list will help you:
Project | Stars | |
---|---|---|
1 | h4cker | 16,457 |
2 | routersploit | 11,857 |
3 | nuclei-templates | 7,979 |
4 | linux-exploit-suggester | 5,170 |
5 | CDK | 3,620 |
6 | Computer-Science-Resources | 2,336 |
7 | SUDO_KILLER | 2,092 |
8 | deepce | 1,096 |
9 | featherduster | 1,058 |
10 | herpaderping | 1,057 |
11 | isf | 998 |
12 | Pompem | 939 |
13 | PoC | 786 |
14 | THC-Archive | 654 |
15 | exploits | 575 |
16 | KEV | 480 |
17 | RomBuster | 420 |
18 | dora | 300 |
19 | AnarchyExploitFixes | 264 |
20 | allinfosecnews_sources | 222 |
21 | OSCE | 186 |
22 | Bookmarklet-Hacks-For-School | 130 |
23 | ShonyDanza | 113 |