An open API service providing repository metadata for many open source software ecosystems.

Topic: "exploitation-framework"

We5ter/Scanners-Box

A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑

Size: 7.08 MB - Last synced at: 2 months ago - Pushed at: 7 months ago - Stars: 8,427 - Forks: 2,383

EntySec/Ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

Language: Python - Size: 440 KB - Last synced at: about 2 months ago - Pushed at: 9 months ago - Stars: 2,997 - Forks: 978

Tuhinshubhra/CMSeeK

CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs

Language: Python - Size: 695 KB - Last synced at: 15 days ago - Pushed at: about 1 year ago - Stars: 2,428 - Forks: 510

0vercl0k/rp

rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.

Language: C++ - Size: 19.6 MB - Last synced at: 16 days ago - Pushed at: 21 days ago - Stars: 1,938 - Forks: 257

wh1t3p1g/ysomap

A helpful Java Deserialization exploit framework.

Language: Java - Size: 1.54 MB - Last synced at: 8 days ago - Pushed at: 4 months ago - Stars: 1,217 - Forks: 150

nccgroup/featherduster

An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction

Language: Python - Size: 768 KB - Last synced at: 20 days ago - Pushed at: over 3 years ago - Stars: 1,106 - Forks: 128

rek7/fireELF

fireELF - Fileless Linux Malware Framework

Language: Python - Size: 143 KB - Last synced at: 12 days ago - Pushed at: about 6 years ago - Stars: 667 - Forks: 112

HexHive/printbf

Brainfuck interpreter inside printf

Language: Brainfuck - Size: 1.34 MB - Last synced at: about 2 months ago - Pushed at: about 4 years ago - Stars: 660 - Forks: 27

jxroot/adbwebkit

ADB For Hackers (:

Language: JavaScript - Size: 3.76 MB - Last synced at: 29 days ago - Pushed at: 2 months ago - Stars: 638 - Forks: 112

vulscanteam/vulscan

vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...

Language: Python - Size: 49.6 MB - Last synced at: 2 months ago - Pushed at: about 6 years ago - Stars: 627 - Forks: 177

ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework

OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.

Language: Python - Size: 187 MB - Last synced at: 12 days ago - Pushed at: almost 5 years ago - Stars: 531 - Forks: 178

security-cheatsheet/metasploit-cheat-sheet

Metasploit Cheat Sheet 💣

Size: 48.8 KB - Last synced at: 3 months ago - Pushed at: over 5 years ago - Stars: 422 - Forks: 90

j91321/rext

Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.

Language: Python - Size: 1.42 MB - Last synced at: over 1 year ago - Pushed at: over 8 years ago - Stars: 345 - Forks: 119

vulncheck-oss/go-exploit

A Go-based Exploit Framework

Language: Go - Size: 860 KB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 340 - Forks: 37

EntySec/HatSploit

Modular penetration testing platform that enables you to write, test, and execute exploit code.

Language: Python - Size: 8.2 MB - Last synced at: 13 days ago - Pushed at: 6 months ago - Stars: 303 - Forks: 67

aziz0x48/vMass

vMass Bot :hook: Vulnerability Scanner & Auto Exploiter Tool Written in Perl.

Language: Perl - Size: 77.1 KB - Last synced at: about 2 months ago - Pushed at: about 2 years ago - Stars: 194 - Forks: 43

Andy53/ERC.Xdbg

An Xdbg Plugin of the ERC Library.

Language: C# - Size: 1.1 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 178 - Forks: 20

TuuuNya/WebPocket

Exploit management framework

Language: Python - Size: 178 KB - Last synced at: 2 months ago - Pushed at: about 2 years ago - Stars: 152 - Forks: 28

stormshadow07/BeeF-Over-Wan

Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]

Language: Python - Size: 141 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 146 - Forks: 97

Project-Prismatica/Prismatica

Responsive Command and Control System

Language: HTML - Size: 9.21 MB - Last synced at: about 1 year ago - Pushed at: over 2 years ago - Stars: 101 - Forks: 21

152334H/pwnscripts 📦

Very simple script(s) to hasten binary exploit creation

Language: Python - Size: 1.22 MB - Last synced at: 24 days ago - Pushed at: about 4 years ago - Stars: 94 - Forks: 7

ronin-rb/ronin-exploits

A Ruby micro-framework for writing and running exploits

Language: Ruby - Size: 4.05 MB - Last synced at: 4 days ago - Pushed at: 4 months ago - Stars: 76 - Forks: 21

exbotanical/brutus

extensible exploitation framework shipped on a modular multi-tasking architecture

Language: Python - Size: 29.5 MB - Last synced at: about 2 months ago - Pushed at: over 2 years ago - Stars: 76 - Forks: 16

TrixSec/waymap

Waymap is a fast and optimized web vulnerability scanner built for penetration testers. It helps in identifying vulnerabilities by testing against various payloads.

Language: Python - Size: 4.69 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 75 - Forks: 6

jxroot/ReHTTP

Simple Powershell Http shell With WEB UI

Language: PHP - Size: 938 KB - Last synced at: 29 days ago - Pushed at: 2 months ago - Stars: 70 - Forks: 8

VainlyStrain/Vaile

Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)

Language: Python - Size: 19.2 MB - Last synced at: 2 months ago - Pushed at: over 4 years ago - Stars: 65 - Forks: 14

witblack/G3nius-Tools-Sploit

G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!

Size: 19.5 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 55 - Forks: 9

krishpranav/Backdoorcreator

Exploit toolkit

Language: Python - Size: 109 KB - Last synced at: about 2 months ago - Pushed at: almost 4 years ago - Stars: 55 - Forks: 18

Amzza0x00/Zerooo-Exploitation-Framework

漏洞利用框架

Language: Python - Size: 243 KB - Last synced at: about 2 years ago - Pushed at: almost 3 years ago - Stars: 54 - Forks: 7

whiterabb17/sifter

Sifter - All purpose penetration testing op-center

Language: Shell - Size: 3.39 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 53 - Forks: 12

hwvs/Invoke-GPTObfuscation

Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to obfuscate your PowerShell penetration testing code, malware, or any other sensitive script.

Language: PowerShell - Size: 32.2 KB - Last synced at: 2 months ago - Pushed at: over 1 year ago - Stars: 49 - Forks: 6

Lucifer1993/lasercrack

Lasercrack-可扩展的Ruby暴力破解框架

Language: Ruby - Size: 251 KB - Last synced at: 2 months ago - Pushed at: almost 7 years ago - Stars: 45 - Forks: 14

paulveillard/cybersecurity-windows-exploitation

A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Windows Exploitation.

Size: 406 KB - Last synced at: about 2 months ago - Pushed at: over 1 year ago - Stars: 43 - Forks: 12

FazalMahmood/ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

Language: Python - Size: 49.8 KB - Last synced at: over 1 year ago - Pushed at: about 2 years ago - Stars: 42 - Forks: 5

machine1337/OP-FUD

Generate FUD Droppers that are undetectable by popular AV's

Language: Python - Size: 2.93 KB - Last synced at: about 1 month ago - Pushed at: over 1 year ago - Stars: 31 - Forks: 9

TcherB31/Metasploit_Pro_Cracked_v4.21.1

Metasploit - A project dedicated to information security

Language: Ruby - Size: 17.6 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 31 - Forks: 9

scipag/AttackToolKit

Open-source Exploiting Framework

Language: Visual Basic - Size: 449 KB - Last synced at: about 20 hours ago - Pushed at: about 8 years ago - Stars: 30 - Forks: 20

0xInfection/PewSWITCH

A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.

Language: Go - Size: 3.34 MB - Last synced at: 8 days ago - Pushed at: over 3 years ago - Stars: 28 - Forks: 10

AvalZ/RevOK

An HTTP Response fuzzer to find Vulnerabilities in Security Scanners

Language: Python - Size: 2.53 MB - Last synced at: 5 months ago - Pushed at: 12 months ago - Stars: 26 - Forks: 7

Coalfire-Research/ERC.Xdbg

An Xdbg Plugin of the ERC Library.

Language: C# - Size: 1.78 MB - Last synced at: 24 days ago - Pushed at: over 1 year ago - Stars: 26 - Forks: 1

dn9uy3n/Get-Shodan

The program allows to download large data from shodan quickly, simply and avoid errors.

Language: Python - Size: 35.2 KB - Last synced at: almost 2 years ago - Pushed at: over 4 years ago - Stars: 26 - Forks: 10

CroodSolutions/AutoPwnKey

AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.

Language: AutoHotkey - Size: 1.28 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 25 - Forks: 5

MrSharkSpamBot/GlidingSword

A wacky exploitation framework written in pure python3.

Language: Python - Size: 81.1 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 25 - Forks: 10

paulveillard/cybersecurity-exploit-development

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.

Size: 3.87 MB - Last synced at: 2 months ago - Pushed at: almost 3 years ago - Stars: 23 - Forks: 5

sectool/Python-Metasploit-Framework-Database-Management

Python - Metasploit-Framework Database Management

Language: Python - Size: 11.7 KB - Last synced at: about 1 month ago - Pushed at: almost 5 years ago - Stars: 15 - Forks: 11

Cybercrack-bot/Cybercrack

This tool is great for information gathering and post- exploitation

Language: Python - Size: 14.3 MB - Last synced at: over 2 years ago - Pushed at: almost 4 years ago - Stars: 14 - Forks: 10

PinkP4nther/PPF

A modular pentesting framework implemented in C

Language: C - Size: 132 KB - Last synced at: over 1 year ago - Pushed at: almost 7 years ago - Stars: 14 - Forks: 7

dynatrace-oss/invadium 📦

Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.

Language: TypeScript - Size: 1.25 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 10 - Forks: 4

Blacking000/Slient-Url-Exploit-New-Cve-Chrome-Exploit-Html-Downloader-Put-Your-Link

URL Infection (Silent Java Drive By) URL Infection Exploit Silent Java Drive by downloads may happen when visiting a site, opening an e-mail message. It may even happen by clicking on a malicious pop-up window: by clicking on the window in the belief that it concerns an error report from the computer’s OS, for example.

Language: C# - Size: 2 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Blacking000/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve

One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted

Language: C++ - Size: 675 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Blacking000/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2022

Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.Silent JPG Exploit There are multiple Exploit JPG in Silent JPG Exploit, a

Language: C++ - Size: 692 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Blacking000/Hta-Exploit-Downloader-Malware-Builder

Features: -Include silent doc exploit -Several exploits, most are sendable via GMail -Compatible with every rat/keylogger/worm -Compatible with Windows XP - Windows 10 32/64 -FUD (DOC CHM) -Works with every MS Office from 2007 to 2016 (excluding Starter edition - there's no macro support) -Startup -base64 encode

Language: C# - Size: 2.86 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

vaibhavkrjha/shufti

All in one OSINT Framework

Language: Shell - Size: 107 KB - Last synced at: over 1 year ago - Pushed at: almost 5 years ago - Stars: 9 - Forks: 4

Caztemaz/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce

Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.

Language: Visual Basic .NET - Size: 17.8 MB - Last synced at: about 2 hours ago - Pushed at: about 2 hours ago - Stars: 8 - Forks: 2

jxroot/powtel

Control a system remotely via telegram in Powershell

Language: PowerShell - Size: 16.2 MB - Last synced at: 2 days ago - Pushed at: 2 months ago - Stars: 8 - Forks: 2

AkutoSai/PyReconExSploit-Framework

PyReconExSploit is a Reconnaissance and Exploitation framework written in Python3.

Language: HTML - Size: 8.5 MB - Last synced at: almost 2 years ago - Pushed at: about 5 years ago - Stars: 8 - Forks: 4

Yuweixn/Anydesk-Exploit-CVE-2025-12654-RCE-Builder

Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

Language: Visual Basic .NET - Size: 113 KB - Last synced at: 28 days ago - Pushed at: 28 days ago - Stars: 7 - Forks: 3

ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder

Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

Language: Visual Basic .NET - Size: 208 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 7 - Forks: 1

DeepakGhengat/psavvy

Programable_Security_Assessment_&_Vulnerability_Verification_System (PSAVVY) framework designed for Recon, vulnerability scanning and exploitation. It features a comprehensive list of Python3 Lambda Functions, equipped with terminal commands, allowing for targeted scanning and autonomous exploitation.

Language: Python - Size: 28.1 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 6 - Forks: 0

actuator/pSlip

pSlip is a Android static analysis toolkit designed primarily to detect components exposing dangerous permissions

Language: Python - Size: 4.98 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 6 - Forks: 0

Conradoduart3/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve

Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.

Language: C++ - Size: 674 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 6 - Forks: 7

LakshayD02/Exploit_Development_Framework_C

A C-based exploit development framework and fuzzing tool designed to test application robustness and security by generating random payloads and targeting vulnerabilities. Automate vulnerability discovery and improve application resilience! 🛡️

Language: C - Size: 5.86 KB - Last synced at: about 2 months ago - Pushed at: 4 months ago - Stars: 5 - Forks: 0

cansofficall/aracindir

Language: Shell - Size: 46.9 KB - Last synced at: over 1 year ago - Pushed at: over 4 years ago - Stars: 5 - Forks: 0

unicornsasfuel/featherduster Fork of nccgroup/featherduster

An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction

Language: Python - Size: 753 KB - Last synced at: 22 days ago - Pushed at: over 6 years ago - Stars: 5 - Forks: 1

owlinux1000/fsalib 📦

format string attack payload generator

Language: Ruby - Size: 131 KB - Last synced at: 20 days ago - Pushed at: about 7 years ago - Stars: 5 - Forks: 1

NoTrac3/XRAP

🚀 XRAP is not just another payload sender—it's a comprehensive attack platform that combines cutting-edge research with military-grade operational security. With capabilities far beyond typical XSS tools, XRAP delivers zero-click exploitation chains with surgical precision and an unparalleled WAF bypass rate.

Size: 61.5 KB - Last synced at: 14 days ago - Pushed at: 14 days ago - Stars: 4 - Forks: 0

intSpLoiT/intframework

The best Hacking Framework

Language: Python - Size: 7.83 MB - Last synced at: 27 days ago - Pushed at: 27 days ago - Stars: 4 - Forks: 3

iamunixtz/FireHawk

FireHawk: The Elite Firebase Security Testing Utility

Language: Python - Size: 470 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 4 - Forks: 0

grimwaldr/ps-wifi-ducky

PowerShell executing Rubber Ducky USB Drive for acquiring network credentials

Language: PowerShell - Size: 38.1 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 4 - Forks: 0

Arenktugrul/INOVA

Siber güvenlik sektörü için çok yönlü amfibi aracı

Language: Python - Size: 4.45 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 4 - Forks: 0

FOGSEC/routersploit Fork of threat9/routersploit

The Router Exploitation Framework

Language: Python - Size: 860 KB - Last synced at: 2 months ago - Pushed at: over 7 years ago - Stars: 4 - Forks: 1

anil-yelken/automatic-exploit

automatic-exploit

Language: Python - Size: 16.6 KB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 3 - Forks: 4

secana/Beef

Docker image for The Browser Exploitation Framework (Beef)

Language: Dockerfile - Size: 8.79 KB - Last synced at: 3 months ago - Pushed at: over 4 years ago - Stars: 3 - Forks: 4

jxroot/RedVision

collection of custom-designed HTML user interfaces for Command & Control (C2) systems.

Language: HTML - Size: 10.2 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 2 - Forks: 1

USDTC/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware

In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.

Language: C++ - Size: 976 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 2 - Forks: 0

Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud

Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.

Language: Visual Basic .NET - Size: 13.4 MB - Last synced at: about 3 hours ago - Pushed at: about 3 hours ago - Stars: 1 - Forks: 1

Caztemaz/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk

Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.

Language: Visual Basic .NET - Size: 12.6 MB - Last synced at: about 3 hours ago - Pushed at: about 3 hours ago - Stars: 1 - Forks: 0

sub2samplays/Metasploit-Framework-2025

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️

Size: 8.79 KB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 1 - Forks: 0

dustin-ww/ADpwn-modules

This repository contains usable modules for the ADpwn framework. These modules are out of the box and are ready for use.

Language: Go - Size: 0 Bytes - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 1 - Forks: 0

USDTC/Slient-URL-Exploit

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

Language: C# - Size: 1.4 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

USDTC/PDF-FUD-Exploit

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

Language: C++ - Size: 588 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

USDTC/Discord-Image-Logger-Stealer

Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token

Language: C# - Size: 556 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

Dragce09/Metasploit-Framework-2025

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️

Size: 1.95 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 1 - Forks: 0

livepwn/hahasecure

"A powerful exploit development toolkit for generating shellcode, creating backdoors, injecting processes, and encoding payloads. Designed for penetration testers and red teamers."

Language: Python - Size: 56.6 KB - Last synced at: 5 days ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

ASMRoyal/0x001829-B

0x001829-B is exploit tool for web servers & for home ip's

Language: C# - Size: 168 KB - Last synced at: 21 days ago - Pushed at: 7 months ago - Stars: 1 - Forks: 0

handler4/taksploit-framework

Taksploit Framework

Language: Python - Size: 697 KB - Last synced at: 9 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

Kittysploit/kittysploit-framework

Language: Python - Size: 515 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 1 - Forks: 0

CarsPound/Slient-PDF-FUD-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

Language: C++ - Size: 1020 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

GameProfOrg/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2022

package commonly used by web services to process Exploit JPG File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted JPG. The exploit for this vulnerability is being used in the wild.Why Are You Disclosing A Exploit JPG

Language: C++ - Size: 632 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 1 - Forks: 1

CalfCrusher/Exif-Maniac

Post Exploitation Framework via Exif Data in images

Language: Python - Size: 177 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 2

proplayer919/REPP-Router-Exploitation-Python-Program Fork of 3xploit-db/Pentest-Tools-Framework 📦

REPP is a database of exploits, scanners and tools for router hacking. REPP is a powerful framework and includes a lot of tools for beginners

Language: Python - Size: 26.7 MB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 1

DeadlyHollows/Redis-Exploitation-Toolkit

Redis Exploitation Toolkit - A tool to pwn Redis server before the bad guys do!

Language: C - Size: 648 KB - Last synced at: 7 months ago - Pushed at: over 3 years ago - Stars: 1 - Forks: 1

krishpranav/PostExploit

A simple Post Exploitation C2 Tool

Language: Python - Size: 6.84 KB - Last synced at: 2 months ago - Pushed at: almost 4 years ago - Stars: 1 - Forks: 2

tadejgasparovic/helix

Java exploitation framework

Language: Java - Size: 178 KB - Last synced at: about 2 years ago - Pushed at: over 6 years ago - Stars: 1 - Forks: 1

root2ch/CMS_Exploit_Framework

Size: 0 Bytes - Last synced at: over 1 year ago - Pushed at: almost 8 years ago - Stars: 1 - Forks: 0

Geinasz/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection

Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.

Language: Visual Basic .NET - Size: 526 KB - Last synced at: about 3 hours ago - Pushed at: about 3 hours ago - Stars: 0 - Forks: 0

RaizCorp/Discord-Image-Logger-Stealer

Discord Image Logger captures images shared in Discord channels. This project serves as a learning tool for developers interested in understanding how to work with Discord's API. 🐙💻

Language: C# - Size: 181 KB - Last synced at: about 16 hours ago - Pushed at: about 16 hours ago - Stars: 0 - Forks: 0

Ulvexon/HTA-Exploit

Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution

Language: C# - Size: 105 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Quelvara/Anydesk-Exploit-CVE-2025-12654-RCE-Builder

Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

Language: Visual Basic .NET - Size: 49.8 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

Ulvexon/PDF-FUD-Exploit

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

Language: C++ - Size: 203 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

Related Topics
exploit 137 exploitation 132 exploit-development 129 cve 100 slient-exploit-builder 97 exploit-code 96 cve-scanning 96 exploit-database 90 exploit-kit 86 exploit-exercises 85 cve-2021-44228 75 slient-exploit 74 slient-url-exploit 69 slient-pdf-exploit 66 slient-jpg-exploit 65 slient-doc-exploit 62 slient-png-exploit 58 slient-hta-exploit 58 exploits 35 cve-2025-44228 23 exploiting 22 cve-search 16 hacking 14 penetration-testing 13 cvent-sast 13 python 12 pentesting 12 security-tools 11 security 11 vulnerability-scanners 10 hacking-tools 9 post-exploitation 9 metasploit 9 anydesk-download 8 anydesk-exploit 8 anydesk-password 8 anydesk-port 8 anydesk-setup 8 windows 8 hack 8 python3 8 kali-linux 8 backdoor 8 hacking-tool 7 hta-exploit 7 anydesk 7 rat 7 doc-exploit 6 hta-exploit-builder 6 vulnerability-detection 6 pentest-tool 6 security-research 6 penetration-testing-framework 6 malware 5 cmd-setup 5 cmd-password 5 cmd-downloader 5 payload 5 android 5 cmd-exploit 5 cmd-fud 5 javascript 5 ethical-hacking 5 pentest 5 red-team 5 reconnaissance 5 red-teaming 5 pen-test-tools 5 security-assessment 5 security-framework 5 framework 5 web-application-security 5 vulnerability-exploitation 5 security-auditing 5 jpg-exploit-builder 4 cyber-security 4 ctf-tools 4 information-gathering 4 registry-exploit 4 exploit-testing 4 network-testing 4 reg 4 reg-exploit 4 registry 4 reg-password 4 reg-setup 4 jpg-exploit 4 lnk 4 lnk-builder 4 termux 4 lnk-payloads 4 lnk-rce 4 lnk-shortcut 4 lnk-stomping 4 infosec 4 linux 4 osint 4 cmd 4 vulnerability 4 c2 4