A collection of hacking / penetration testing resources to make you better!
-
Updated
Dec 11, 2019
A collection of hacking / penetration testing resources to make you better!
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant
This repository contains several applications, demonstrating the Meltdown bug.
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
To facilitate easier studying of these types of vulnerabilities the tool scaffolding should be able to instrument itself to generate ASCII diagrams of payload object-graphs (similar to this) and deserialization code execution call-trees (similar to [this](https://gist.github.com/frohoff/24af7913611f8406ea
A bunch of links related to Linux kernel exploitation
we should be able to determine the name of the syscall and the args, based on the abi.
If we assume linux (we shouldn't) we can put this in the arch.
is_syscall
get_syscall_args
are probably the only methods we need to add. man syscall to see the abis.
Only issue is that we don't know, unless we hardcode, which args are used, unless we backtrack to see which registers were written
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
Advanced vulnerability scanning with Nmap NSE
My proof-of-concept exploits for the Linux kernel
A container repository for my public web hacks!
I feel like our IPC API can take a little getting used to, and there is very little public documentation; pretty much all anyone has to go off of are the few included scripts.
There appears to be a broken method in hash extend that is not valid due to it missing a def ():
In addition to this, there appears to be no body for the method.
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.
To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."
It looks like the last time the documentation was updated is about a year ago, because the
readthedocsbuilds are failing.