Skip to content
View JohnTroony's full-sized avatar
🐙
multitasking
🐙
multitasking

Block or report JohnTroony

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 62,311 14,847 Updated Dec 4, 2024

JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps v…

Java 903 164 Updated Jan 11, 2022

ELEGANTBOUNCER is a detection tool for file-based mobile exploits.

Rust 29 2 Updated Dec 30, 2023

Tools developed by the Zscaler ThreatLabz Threat Intelligence team

Python 69 18 Updated Dec 2, 2024

python library to examine ptmalloc (the glibc userland heap implementation)

Python 504 79 Updated May 11, 2021

Build a database of libc offsets to simplify exploitation

Shell 1,733 191 Updated Oct 23, 2024

PEDA - Python Exploit Development Assistance for GDB

Python 5,924 807 Updated Jul 29, 2024

Exploit Development and Reverse Engineering with GDB Made Easy

Python 7,849 912 Updated Jan 1, 2025

CTF framework and exploit development library

Python 12,257 1,723 Updated Dec 10, 2024

Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper us…

Python 1,892 208 Updated Oct 27, 2024

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…

Python 3,996 557 Updated Sep 30, 2024

Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.

C++ 566 73 Updated Dec 25, 2024

Transform Linux Audit logs for SIEM usage

Rust 729 61 Updated Jan 3, 2025

android-inject-hook

C 15 4 Updated Feb 8, 2018

Indicators of Compromise from Amnesty International's cyber investigations

Python 1,572 176 Updated Dec 16, 2024

Create adversarial attacks against machine learning Windows malware detectors

Python 210 47 Updated Dec 10, 2024

CVE-2021-1732 poc & exp; tested on 20H2

C++ 67 17 Updated Apr 23, 2021

API logger plugin for Intel Pintool

C++ 14 7 Updated Nov 19, 2017

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.

Go 1,135 115 Updated Jul 14, 2024

Expriments

Python 451 79 Updated Oct 3, 2024

tiny, portable SOCKS5 server with very moderate resource usage

C 1,621 277 Updated May 24, 2024

PwnWiki - The notes section of the pentesters mind.

HTML 556 269 Updated Oct 22, 2018

Redress - A tool for analyzing stripped Go binaries

Go 963 57 Updated Jan 5, 2025

Cobalt Strike random C2 Profile generator

Python 635 89 Updated Jan 5, 2023

Tool for viewing and analyzing execution traces

Python 273 54 Updated Mar 18, 2021

Collection of methodology and test case for various web vulnerabilities.

6,198 1,760 Updated Aug 4, 2024

Managed code hooking template.

C# 106 7 Updated Feb 15, 2021

TAI SOC Blog powered by HUGO a Static Site Generator

HTML 2 2 Updated Apr 17, 2021
Next