Skip to content
View kljunowsky's full-sized avatar
🦉
🦉

Block or report kljunowsky

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Automatic SQL injection and database takeover tool

Python 35,738 6,099 Updated Nov 10, 2025

A collection of awesome penetration testing resources, tools and other shiny things

24,438 4,668 Updated Jul 1, 2025

Playground (and dump) of stuff I make or modify for the Flipper Zero

C 16,146 3,647 Updated Oct 27, 2025

Impacket is a collection of Python classes for working with network protocols.

Python 15,085 3,815 Updated Nov 7, 2025

Animate Anyone: Consistent and Controllable Image-to-Video Synthesis for Character Animation

14,798 1,007 Updated Sep 20, 2025

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

Java 8,581 1,843 Updated Mar 31, 2024

Never ever ever use pixelation as a redaction technique

TypeScript 8,156 798 Updated Mar 15, 2024

Gather and update all available and newest CVEs with their PoC.

HTML 7,351 929 Updated Nov 10, 2025

A cheat sheet that contains advanced queries for SQL Injection of all types.

3,094 694 Updated May 13, 2023

SSRF (Server Side Request Forgery) testing resources

Python 2,465 490 Updated Oct 12, 2024

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,113 295 Updated Aug 15, 2024

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

C 2,027 358 Updated May 28, 2025

A little toolbox to play with Microsoft Kerberos in C

C 1,500 221 Updated Dec 14, 2021

Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.

C 1,260 191 Updated Aug 11, 2024

1337 Wordlists for Bug Bounty Hunting

905 176 Updated Sep 6, 2025

The most exhaustive list of reliable DNS resolvers.

892 99 Updated Nov 10, 2025

A simple tool for bypassing file upload restrictions.

Python 881 136 Updated Jul 22, 2024

CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation

C 577 100 Updated Jun 7, 2022

Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.

Python 494 50 Updated Jan 23, 2023
Python 412 79 Updated Oct 29, 2025

CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator

274 39 Updated Feb 2, 2023

A Zphisher GUI Back-Office Plugin

JavaScript 231 45 Updated Oct 7, 2023

CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server

Python 90 12 Updated Jan 21, 2023

This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.

Python 81 7 Updated Dec 29, 2023

SpringFramework 远程代码执行漏洞CVE-2022-22965

Python 74 17 Updated Apr 1, 2022

Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.

Python 56 9 Updated Dec 29, 2023

Juniper Firewalls CVE-2023-36845 - RCE

Python 53 14 Updated Dec 29, 2023

Combine words from two wordlist files and concatenate them with an optional delimiter

Go 38 10 Updated Sep 25, 2023

PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication

Python 36 7 Updated Jul 5, 2022

CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit

Python 26 7 Updated Dec 29, 2023
Next