Showing 17 open source projects for "pwn"

View related business solutions
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1
    Power Pwn

    Power Pwn

    Repurpose Microsoft-trusted executables, service accounts, etc.

    Repurpose Microsoft-trusted executables, service accounts and cloud services to power a malware operation. These materials are presented from an attacker’s perspective with the goal of raising awareness to the risks of underestimating the security impact of No Code/Low Code. No Code/Low Code is awesome.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Pwntools

    Pwntools

    CTF framework and exploit development library

    ...Whether you’re using it to write exploits, or as part of another software project will dictate how you use it. Historically pwntools was used as a sort of exploit-writing DSL. Simply doing from pwn import in a previous version of pwntools would bring all sorts of nice side-effects. This version imports everything from the toplevel pwnlib along with functions from a lot of submodules. This means that if you do import pwn or from pwn import , you will have access to everything you need to write an exploit. Calls pwnlib.term.init() to put your terminal in raw mode and implements functionality to make it appear like it isn’t. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    Google CTF

    Google CTF

    Google CTF

    Google CTF is the public repository that houses most of the challenges from Google’s Capture-the-Flag competitions since 2017 and the infrastructure used to run them. It’s a learning and practice archive: competitors and educators can replay tasks across categories like pwn, reversing, crypto, web, sandboxing, and forensics. The code and binaries intentionally contain vulnerabilities—by design—so users can explore exploit chains and patching in realistic settings. The repo also includes infrastructure components and links to a scoreboard implementation, giving organizers reference material for hosting their own events. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PentestGPT

    PentestGPT

    Automated Penetration Testing Agentic Framework Powered by LLMs

    PentestGPT is an AI-powered autonomous penetration testing agent designed to perform intelligent, end-to-end security assessments using large language models. Published at USENIX Security 2024, it combines advanced reasoning with an agentic workflow to automate tasks traditionally handled by human pentesters. The platform supports multiple penetration testing categories, including web security, cryptography, reversing, forensics, privilege escalation, and binary exploitation. PentestGPT runs...
    Downloads: 378 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 5
    Kubernetes Goat

    Kubernetes Goat

    Kubernetes Goat is a "Vulnerable by Design" cluster environment

    Learn to attack or find security issues, misconfigurations, and real-world hacks within containers, Kubernetes, and cloud-native environments. Enumerate, exploit, and gain access to the workloads right from your browser. Understand how attackers think, work, and exploit security issues, and apply these learnings to detect and defend them. Also, learn best practices, defenses, and tools to mitigate, and detect in the real world. Learn the hacks, defenses, and tools. So that you can think like...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Pocohunter
    ...* The beta is very outdated so wait for valid 1.1 release ### Telegram https://t.me/pocohunter_rom ##Features * Out of the box nethunter functionality with supported kernel * HID, Works * Custom apps out of the box. #### Sources https://github.com/PWN-Hunter
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    pwnCheck

    Password pwn check.

    This program is a graphical user interface for checking pwned passwords, it's writen with python and pyQT4. Program calculates password hash and then searches for matches with first 5 symbols (prefix) in https://api.pwnedpasswords.com, then full hash match is found localy on users PC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Wi-PWN

    Wi-PWN

    ESP8266 firmware for performing deauthentication attacks

    ESP8266 firmware for performing deauthentication attacks, with ease. Wi-PWN is a firmware that performs death attacks on cheap Arduino boards. The ESP8266 is a cheap microcontroller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino. A deauthentication attack is often confused with Wi-Fi jamming, as they both block users from accessing Wi-Fi networks. The 802.11 Wi-Fi protocol contains a so-called deauthentication frame.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    PWN Reader Web

    PWN Reader Web

    Web based manag and comic reader with thumbnail supports

    A browser based manga reader that will let you browse your manga collection. It enable you to browse them as you browser in any of the online comics site. It uses python to generate list of the manga in the library and use jQuery to let you browse those in the browser
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10

    CrunchPwn

    Lightweight Debian Based Pen Testing Linux Distro

    #Pwn Linux (pronounced CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux. The packages also work with any Debian Wheezy compliant system. Default themes are built specifically for OpenBox, but feel free to submit themes for various windows managers. Pull requests are gladly accepted, and requests for tools can be made by opening an issue on github or on sourceforge.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    smbexec

    A rapid psexec style attack with samba tools

    ...v=o3d0wfGUCWM&feature=plcp Tested on: - BackTrack 5R2 - 32 & 64 Bit - Ubuntu 10.04.4 LTS - 32 & 64 Bit - Ubuntu 12.04 LTS - 32 & 64 Bit - Debian 6 - 32 & 64 Bit - Fedora 16 - 32 & 64 Bit - Fedora 17 - 32 & 64 Bit Coming Soon: Pentoo Pwnie Express - Pwn Plug 1.1 Happy hunting!
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12

    Sqlsheezy

    Script For Sqlmap

    ...Right now its at the start of its scripting but it does full sql injection can gather databases tables and columns and dump the information. But i have alot to add for os-shell --os-pwn and so on and i got alot more to add into to cause right now its url base so you cant use a attack file or soforth. yet but when i have it 100 % complete this script will let a simple idiot pentest sql 10 times easier then sqlmap allready is.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Pwn Plug Elite

    Pwn Plug Elite

    Pwnie Express Pwn Plug Elite image for stock Sheevaplugs

    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ha-pi

    ha-pi

    ha(ck with raspberry)pi

    This debian squeeze image created to perform "pwn plug" type of attacks using Raspberry pi. pleas look at the wiki for further details https://sourceforge.net/p/ha-pi/wiki/Home/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The Phorensic Work eNvironment is designed to be a forensic examination framework with a heavy focus on automation and automatic case documentation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A PHP based auto Local Exploit trigger. It detects kernel version ,gcc and auto pwn it for specific vulnerabilities. A standard proof of concept.This PHP based script, when allows to upload on vulnerable server .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Program pozwalajacy na korzystanie z encyklopedii PWN 99 na AmigaOS/MorphOS/Linux. Obecnie trwaja prace nad dostoswaniem ame do encyklopedii fogra 2001.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB