Skip to content
View dhn's full-sized avatar
☠️
"><svg/onload=alert(1)>
☠️
"><svg/onload=alert(1)>

Block or report dhn

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

PIC lsass dumper using cloned handles

C 580 103 Updated Oct 18, 2022

A set of Linux binary exploitation tasks for beginners on various architectures

Python 531 93 Updated Dec 26, 2021

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML 2,281 342 Updated Feb 16, 2025

A collection of links related to Linux kernel security and exploitation

5,863 1,000 Updated Mar 3, 2025

VirtualBox 3D exploits & PoCs

Python 160 39 Updated Jan 24, 2019

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,426 1,375 Updated Oct 28, 2024

Universal command-line interface for SQL databases

Go 9,296 362 Updated Mar 5, 2025

Exercises to learn how to fuzz with American Fuzzy Lop

C 1,250 198 Updated Oct 12, 2022

This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate. The objective is to simplify as much as possible t…

Python 285 43 Updated Jan 15, 2025

Linux Exploits

C 138 51 Updated Jun 9, 2015

Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.

1,767 232 Updated Jun 8, 2019

A repository for learning various heap exploitation techniques.

C 7,602 1,173 Updated Mar 17, 2025

Easy parallel execution of commands with live feedback

Go 490 14 Updated Jan 2, 2021

Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.

Python 3,054 275 Updated Aug 31, 2021

Metasploit Framework

Ruby 35,195 14,228 Updated Mar 28, 2025

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 61,734 24,235 Updated Mar 30, 2025

Course materials for Modern Binary Exploitation by RPISEC

C 5,632 894 Updated Dec 9, 2021

CTF framework and exploit development library

Python 12,470 1,740 Updated Mar 30, 2025

UNIX-like reverse engineering framework and command-line toolset

C 21,415 3,057 Updated Mar 30, 2025

PEDA - Python Exploit Development Assistance for GDB

Python 5,974 814 Updated Jul 29, 2024
Showing results