Stars
Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access.
Cross-platform C port of the Copy Fail Linux LPE (CVE-2026-31431). Disclosed 2026-04-29 by Theori / Xint.
Python tarfile data filter bypass via PATH_MAX overflow in os.path.realpath() - CVE-2025-4517 / CVE-2025-4330
A Go implementation of copyfail (CVE-2026-31431)
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
Provides packet processing capabilities for Go
If you want to become good at system design, join this newsletter now 👇
Proof of concept code for the Spectre CPU exploit.
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Open-source AI hackers to find and fix your app’s vulnerabilities.
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"
eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)
lazy way to create CVE-2023-38831 winrar file for testing
Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on the Internet. When it receives signals from the actual target…
Windows and Cygwin port of proxychains, based on MinHook and DLL Injection
c6fc / npk
Forked from Coalfire-Research/npkA mostly-serverless distributed hash cracking platform
A tiny Reverse Sock5 Proxy written in C :V
Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop