An open API service providing repository metadata for many open source software ecosystems.

Topic: "exploitation-framework"

We5ter/Scanners-Box

A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑

Size: 7.11 MB - Last synced at: about 1 month ago - Pushed at: 3 months ago - Stars: 8,657 - Forks: 2,412

EntySec/Ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

Language: Python - Size: 403 KB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 3,194 - Forks: 1,021

Tuhinshubhra/CMSeeK

CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs

Language: Python - Size: 695 KB - Last synced at: 6 months ago - Pushed at: over 1 year ago - Stars: 2,428 - Forks: 510

0vercl0k/rp

rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.

Language: C++ - Size: 19.6 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 2,004 - Forks: 264

wh1t3p1g/ysomap

A helpful Java Deserialization exploit framework.

Language: Java - Size: 1.54 MB - Last synced at: 6 months ago - Pushed at: 9 months ago - Stars: 1,217 - Forks: 150

nccgroup/featherduster

An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction

Language: Python - Size: 768 KB - Last synced at: 6 months ago - Pushed at: almost 4 years ago - Stars: 1,106 - Forks: 128

HexHive/printbf

Brainfuck interpreter inside printf

Language: Brainfuck - Size: 1.34 MB - Last synced at: 4 months ago - Pushed at: over 4 years ago - Stars: 670 - Forks: 28

rek7/fireELF

fireELF - Fileless Linux Malware Framework

Language: Python - Size: 143 KB - Last synced at: 6 months ago - Pushed at: over 6 years ago - Stars: 667 - Forks: 112

jxroot/adbwebkit

ADB For Hackers (:

Language: JavaScript - Size: 3.76 MB - Last synced at: 7 months ago - Pushed at: 8 months ago - Stars: 638 - Forks: 112

vulscanteam/vulscan

vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...

Language: Python - Size: 49.6 MB - Last synced at: 8 months ago - Pushed at: over 6 years ago - Stars: 627 - Forks: 177

ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework

OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.

Language: Python - Size: 187 MB - Last synced at: 6 months ago - Pushed at: over 5 years ago - Stars: 531 - Forks: 178

security-cheatsheet/metasploit-cheat-sheet

Metasploit Cheat Sheet 💣

Size: 48.8 KB - Last synced at: 8 months ago - Pushed at: almost 6 years ago - Stars: 422 - Forks: 90

vulncheck-oss/go-exploit

A Go-based Exploit Framework

Language: Go - Size: 1.12 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 372 - Forks: 42

j91321/rext

Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.

Language: Python - Size: 1.42 MB - Last synced at: about 2 years ago - Pushed at: almost 9 years ago - Stars: 345 - Forks: 119

EntySec/HatSploit

Modular penetration testing platform that enables you to write, test, and execute exploit code.

Language: Python - Size: 8.2 MB - Last synced at: 6 months ago - Pushed at: 12 months ago - Stars: 303 - Forks: 67

aziz0x48/vMass

vMass Bot :hook: Vulnerability Scanner & Auto Exploiter Tool Written in Perl.

Language: Perl - Size: 77.1 KB - Last synced at: 8 months ago - Pushed at: over 2 years ago - Stars: 194 - Forks: 43

Andy53/ERC.Xdbg

An Xdbg Plugin of the ERC Library.

Language: C# - Size: 1.1 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 178 - Forks: 20

TuuuNya/WebPocket

Exploit management framework

Language: Python - Size: 178 KB - Last synced at: 4 months ago - Pushed at: over 2 years ago - Stars: 152 - Forks: 28

stormshadow07/BeeF-Over-Wan

Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]

Language: Python - Size: 141 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 146 - Forks: 97

Project-Prismatica/Prismatica

Responsive Command and Control System

Language: HTML - Size: 9.21 MB - Last synced at: over 1 year ago - Pushed at: about 3 years ago - Stars: 101 - Forks: 21

CroodSolutions/AutoPwnKey

AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.

Language: AutoHotkey - Size: 1.3 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 97 - Forks: 11

152334H/pwnscripts 📦

Very simple script(s) to hasten binary exploit creation

Language: Python - Size: 1.22 MB - Last synced at: 4 months ago - Pushed at: over 4 years ago - Stars: 94 - Forks: 7

TrixSec/waymap

Waymap is a fast and optimized web vulnerability scanner built for penetration testers. It helps in identifying vulnerabilities by testing against various payloads.

Language: Python - Size: 5.78 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 92 - Forks: 10

ronin-rb/ronin-exploits

A Ruby micro-framework for writing and running exploits

Language: Ruby - Size: 4.05 MB - Last synced at: about 1 month ago - Pushed at: 9 months ago - Stars: 79 - Forks: 21

exbotanical/brutus

extensible exploitation framework shipped on a modular multi-tasking architecture

Language: Python - Size: 29.5 MB - Last synced at: 29 days ago - Pushed at: almost 3 years ago - Stars: 78 - Forks: 16

jxroot/ReHTTP

Simple Powershell Http shell With WEB UI

Language: PHP - Size: 938 KB - Last synced at: 7 months ago - Pushed at: 8 months ago - Stars: 70 - Forks: 8

VainlyStrain/Vaile

Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)

Language: Python - Size: 19.2 MB - Last synced at: 8 months ago - Pushed at: almost 5 years ago - Stars: 65 - Forks: 14

krishpranav/Backdoorcreator

Exploit toolkit

Language: Python - Size: 109 KB - Last synced at: 5 months ago - Pushed at: over 4 years ago - Stars: 56 - Forks: 19

witblack/G3nius-Tools-Sploit

G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!

Size: 19.5 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 55 - Forks: 9

Yv1ren/Zerooo-Exploitation-Framework

漏洞利用框架

Language: Python - Size: 246 KB - Last synced at: 4 months ago - Pushed at: about 2 years ago - Stars: 54 - Forks: 8

whiterabb17/sifter

Sifter - All purpose penetration testing op-center

Language: Shell - Size: 3.39 MB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 53 - Forks: 12

hwvs/Invoke-GPTObfuscation

Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to obfuscate your PowerShell penetration testing code, malware, or any other sensitive script.

Language: PowerShell - Size: 32.2 KB - Last synced at: 4 months ago - Pushed at: almost 2 years ago - Stars: 49 - Forks: 6

Lucifer1993/lasercrack

Lasercrack-可扩展的Ruby暴力破解框架

Language: Ruby - Size: 251 KB - Last synced at: about 1 month ago - Pushed at: over 7 years ago - Stars: 44 - Forks: 14

paulveillard/cybersecurity-windows-exploitation

A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Windows Exploitation.

Size: 406 KB - Last synced at: 7 months ago - Pushed at: almost 2 years ago - Stars: 43 - Forks: 12

FazalMahmood/ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

Language: Python - Size: 49.8 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 42 - Forks: 5

root4031/OP-FUD

Generate FUD Droppers that are undetectable by popular AV's

Language: Python - Size: 2.93 KB - Last synced at: about 2 months ago - Pushed at: about 2 years ago - Stars: 32 - Forks: 9

TcherB31/Metasploit_Pro_Cracked_v4.21.1

Metasploit - A project dedicated to information security

Language: Ruby - Size: 17.6 KB - Last synced at: over 2 years ago - Pushed at: about 3 years ago - Stars: 31 - Forks: 9

scipag/AttackToolKit

Open-source Exploiting Framework

Language: Visual Basic - Size: 449 KB - Last synced at: about 2 months ago - Pushed at: over 8 years ago - Stars: 30 - Forks: 20

dn9uy3n/Get-Shodan

The program allows to download large data from shodan quickly, simply and avoid errors.

Language: Python - Size: 35.2 KB - Last synced at: about 1 month ago - Pushed at: about 5 years ago - Stars: 29 - Forks: 11

0xInfection/PewSWITCH

A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.

Language: Go - Size: 3.34 MB - Last synced at: about 1 month ago - Pushed at: almost 4 years ago - Stars: 28 - Forks: 10

AvalZ/RevOK

An HTTP Response fuzzer to find Vulnerabilities in Security Scanners

Language: Python - Size: 2.53 MB - Last synced at: about 2 months ago - Pushed at: over 1 year ago - Stars: 27 - Forks: 8

Coalfire-Research/ERC.Xdbg

An Xdbg Plugin of the ERC Library.

Language: C# - Size: 1.78 MB - Last synced at: 6 months ago - Pushed at: almost 2 years ago - Stars: 26 - Forks: 1

MrSharkSpamBot/GlidingSword

A wacky exploitation framework written in pure python3.

Language: Python - Size: 81.1 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 25 - Forks: 10

paulveillard/cybersecurity-exploit-development

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.

Size: 3.87 MB - Last synced at: 8 months ago - Pushed at: over 3 years ago - Stars: 23 - Forks: 5

actuator/pSlip

pSlip is an Android Static Analysis Toolkit Designed To Detect Applications Exposing Dangerous Permissions, Explicit Intent Injection & Tapjacking Risk (Beta) now in V.1.0.5

Language: Python - Size: 5.06 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 16 - Forks: 2

sectool/Python-Metasploit-Framework-Database-Management

Python - Metasploit-Framework Database Management

Language: Python - Size: 11.7 KB - Last synced at: 4 months ago - Pushed at: over 5 years ago - Stars: 15 - Forks: 11

Cybercrack-bot/Cybercrack

This tool is great for information gathering and post- exploitation

Language: Python - Size: 14.3 MB - Last synced at: over 2 years ago - Pushed at: over 4 years ago - Stars: 14 - Forks: 10

PinkP4nther/PPF

A modular pentesting framework implemented in C

Language: C - Size: 132 KB - Last synced at: about 2 years ago - Pushed at: over 7 years ago - Stars: 14 - Forks: 7

Caztemaz/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce

Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.

Language: Visual Basic .NET - Size: 19.3 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 12 - Forks: 3

dynatrace-oss/invadium 📦

Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.

Language: TypeScript - Size: 1.25 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 4

Blacking000/Slient-Url-Exploit-New-Cve-Chrome-Exploit-Html-Downloader-Put-Your-Link

URL Infection (Silent Java Drive By) URL Infection Exploit Silent Java Drive by downloads may happen when visiting a site, opening an e-mail message. It may even happen by clicking on a malicious pop-up window: by clicking on the window in the belief that it concerns an error report from the computer’s OS, for example.

Language: C# - Size: 2 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Blacking000/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve

One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted

Language: C++ - Size: 675 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Blacking000/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2022

Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.Silent JPG Exploit There are multiple Exploit JPG in Silent JPG Exploit, a

Language: C++ - Size: 692 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Blacking000/Hta-Exploit-Downloader-Malware-Builder

Features: -Include silent doc exploit -Several exploits, most are sendable via GMail -Compatible with every rat/keylogger/worm -Compatible with Windows XP - Windows 10 32/64 -FUD (DOC CHM) -Works with every MS Office from 2007 to 2016 (excluding Starter edition - there's no macro support) -Startup -base64 encode

Language: C# - Size: 2.86 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

vaibhavkrjha/shufti

All in one OSINT Framework

Language: Shell - Size: 107 KB - Last synced at: almost 2 years ago - Pushed at: over 5 years ago - Stars: 9 - Forks: 4

jxroot/RedVision

collection of custom-designed HTML user interfaces for Command & Control (C2) systems.

Language: HTML - Size: 10.2 MB - Last synced at: about 2 months ago - Pushed at: 8 months ago - Stars: 8 - Forks: 2

jxroot/powtel

Control a system remotely via telegram in Powershell

Language: PowerShell - Size: 16.2 MB - Last synced at: 6 months ago - Pushed at: 8 months ago - Stars: 8 - Forks: 2

AkutoSai/PyReconExSploit-Framework

PyReconExSploit is a Reconnaissance and Exploitation framework written in Python3.

Language: HTML - Size: 8.5 MB - Last synced at: over 2 years ago - Pushed at: over 5 years ago - Stars: 8 - Forks: 4

Yuweixn/Anydesk-Exploit-CVE-2025-12654-RCE-Builder

Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

Language: Visual Basic .NET - Size: 113 KB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 7 - Forks: 3

ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder

Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

Language: Visual Basic .NET - Size: 208 KB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 7 - Forks: 1

DeepakGhengat/psavvy

Programable_Security_Assessment_&_Vulnerability_Verification_System (PSAVVY) framework designed for Recon, vulnerability scanning and exploitation. It features a comprehensive list of Python3 Lambda Functions, equipped with terminal commands, allowing for targeted scanning and autonomous exploitation.

Language: Python - Size: 28.1 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 6 - Forks: 0

Conradoduart3/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve

Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.

Language: C++ - Size: 674 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 6 - Forks: 7

intSpLoiT/intframework

The best Hacking Framework

Language: Python - Size: 8.65 MB - Last synced at: 7 days ago - Pushed at: 7 days ago - Stars: 5 - Forks: 2

LakshayD02/Exploit_Development_Framework_C

A C-based exploit development framework and fuzzing tool designed to test application robustness and security by generating random payloads and targeting vulnerabilities. Automate vulnerability discovery and improve application resilience! 🛡️

Language: C - Size: 5.86 KB - Last synced at: 7 months ago - Pushed at: 10 months ago - Stars: 5 - Forks: 0

cansofficall/aracindir

Language: Shell - Size: 46.9 KB - Last synced at: about 2 years ago - Pushed at: almost 5 years ago - Stars: 5 - Forks: 0

unicornsasfuel/featherduster Fork of nccgroup/featherduster

An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction

Language: Python - Size: 753 KB - Last synced at: about 2 months ago - Pushed at: about 7 years ago - Stars: 5 - Forks: 1

owlinux1000/fsalib 📦

format string attack payload generator

Language: Ruby - Size: 131 KB - Last synced at: 11 days ago - Pushed at: over 7 years ago - Stars: 5 - Forks: 1

Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud

Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.

Language: Visual Basic .NET - Size: 14.9 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 4 - Forks: 2

Caztemaz/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk

Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.

Language: Visual Basic .NET - Size: 13.6 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 4 - Forks: 0

NoTrac3/XRAP

🚀 XRAP is not just another payload sender—it's a comprehensive attack platform that combines cutting-edge research with military-grade operational security. With capabilities far beyond typical XSS tools, XRAP delivers zero-click exploitation chains with surgical precision and an unparalleled WAF bypass rate.

Size: 61.5 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 4 - Forks: 0

iamunixtz/FireHawk

FireHawk: The Elite Firebase Security Testing Utility

Language: Python - Size: 470 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 4 - Forks: 0

grimwaldr/ps-wifi-ducky

PowerShell executing Rubber Ducky USB Drive for acquiring network credentials

Language: PowerShell - Size: 38.1 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 4 - Forks: 0

Arenktugrul/INOVA

Siber güvenlik sektörü için çok yönlü amfibi aracı

Language: Python - Size: 4.45 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 4 - Forks: 0

FOGSEC/routersploit Fork of threat9/routersploit

The Router Exploitation Framework

Language: Python - Size: 860 KB - Last synced at: 8 months ago - Pushed at: almost 8 years ago - Stars: 4 - Forks: 1

Yuri08loveElaina/elaina-c2

Elaina-C2 — Advanced Exploitation & C2 Framework with GUI/CLI, ADCS integration, TOR/Burp support, and stealth evasion modules.

Language: Python - Size: 229 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 3 - Forks: 2

anil-yelken/automatic-exploit

automatic-exploit

Language: Python - Size: 16.6 KB - Last synced at: over 2 years ago - Pushed at: almost 4 years ago - Stars: 3 - Forks: 4

secana/Beef

Docker image for The Browser Exploitation Framework (Beef)

Language: Dockerfile - Size: 8.79 KB - Last synced at: 9 months ago - Pushed at: about 5 years ago - Stars: 3 - Forks: 4

superfashi/pwnbot-ng

A fast, safe and headless automatic exploit thrower for Attack/Defense Capture the Flag (CTF) competitions.

Language: Go - Size: 68.4 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 2 - Forks: 0

ksnnd32/redis_exploit

🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.

Language: Python - Size: 1.5 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 1 - Forks: 0

sub2samplays/Metasploit-Framework-2025

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️

Size: 8.79 KB - Last synced at: 7 days ago - Pushed at: 7 days ago - Stars: 1 - Forks: 0

cybersecurity-dev/awesome-binary-exploitation

Awesome Binary Exploitation

Size: 15.6 KB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 1 - Forks: 0

Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder

Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

Language: Visual Basic .NET - Size: 47.9 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 1 - Forks: 0

v01dHackTeam/v01dTooL

All-in-one Pentesting tool

Language: Python - Size: 18.6 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 1 - Forks: 0

Maitonnx/Anydesk-Exploit-CVE-2025-12654-RCE-Builder

Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

Language: Visual Basic .NET - Size: 46.9 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 1

Geinasz/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection

Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.

Language: Visual Basic .NET - Size: 1.89 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

dustin-ww/ADpwn-modules

This repository contains usable modules for the ADpwn framework. These modules are out of the box and are ready for use.

Language: Go - Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 1 - Forks: 0

USDTC/Slient-URL-Exploit

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

Language: C# - Size: 1.4 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 1 - Forks: 0

Dragce09/Metasploit-Framework-2025

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️

Size: 1.95 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 1 - Forks: 0

livepwn/hahasecure

"A powerful exploit development toolkit for generating shellcode, creating backdoors, injecting processes, and encoding payloads. Designed for penetration testers and red teamers."

Language: Python - Size: 56.6 KB - Last synced at: 6 months ago - Pushed at: 9 months ago - Stars: 1 - Forks: 0

ASMRoyal/0x001829-B

0x001829-B is exploit tool for web servers & for home ip's

Language: C# - Size: 168 KB - Last synced at: 6 months ago - Pushed at: 12 months ago - Stars: 1 - Forks: 0

handler4/taksploit-framework

Taksploit Framework

Language: Python - Size: 697 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

Kittysploit/kittysploit-framework

Language: Python - Size: 515 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 1 - Forks: 0

CarsPound/Slient-PDF-FUD-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

Language: C++ - Size: 1020 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 1 - Forks: 0

GameProfOrg/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2022

package commonly used by web services to process Exploit JPG File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted JPG. The exploit for this vulnerability is being used in the wild.Why Are You Disclosing A Exploit JPG

Language: C++ - Size: 632 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 1

CalfCrusher/Exif-Maniac

Post Exploitation Framework via Exif Data in images

Language: Python - Size: 177 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 2

proplayer919/REPP-Router-Exploitation-Python-Program Fork of 3xploit-db/Pentest-Tools-Framework 📦

REPP is a database of exploits, scanners and tools for router hacking. REPP is a powerful framework and includes a lot of tools for beginners

Language: Python - Size: 26.7 MB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 1 - Forks: 1

DeadlyHollows/Redis-Exploitation-Toolkit

Redis Exploitation Toolkit - A tool to pwn Redis server before the bad guys do!

Language: C - Size: 648 KB - Last synced at: about 1 year ago - Pushed at: almost 4 years ago - Stars: 1 - Forks: 1

krishpranav/PostExploit

A simple Post Exploitation C2 Tool

Language: Python - Size: 6.84 KB - Last synced at: about 1 month ago - Pushed at: about 4 years ago - Stars: 1 - Forks: 2

tadejgasparovic/helix

Java exploitation framework

Language: Java - Size: 178 KB - Last synced at: over 2 years ago - Pushed at: almost 7 years ago - Stars: 1 - Forks: 1

root2ch/CMS_Exploit_Framework

Size: 0 Bytes - Last synced at: almost 2 years ago - Pushed at: over 8 years ago - Stars: 1 - Forks: 0

Related Topics
exploit 189 exploitation 185 exploit-development 178 cve 150 slient-exploit-builder 145 exploit-code 144 cve-scanning 144 exploit-database 138 exploit-kit 133 exploit-exercises 133 cve-2021-44228 106 slient-exploit 105 slient-url-exploit 100 slient-pdf-exploit 97 slient-jpg-exploit 96 slient-doc-exploit 93 slient-png-exploit 89 slient-hta-exploit 88 cve-2025-44228 40 exploits 35 exploiting 22 cve-search 16 pentesting 15 hacking 14 penetration-testing 14 cvent-sast 13 anydesk-download 13 anydesk-exploit 13 anydesk-password 13 python 13 anydesk-port 13 anydesk-setup 13 anydesk 12 post-exploitation 11 security 11 security-tools 11 metasploit 10 vulnerability-scanners 10 hacking-tools 10 red-team 9 doc-exploit 9 security-research 9 hacking-tool 9 kali-linux 8 windows 8 backdoor 8 cmd-downloader 8 cmd-exploit 8 hack 8 pentest 8 cmd-fud 8 cmd-password 8 cmd-setup 8 python3 8 reg-setup 7 reg-password 7 rat 7 ethical-hacking 7 lnk-stomping 7 penetration-testing-framework 7 lnk-shortcut 7 lnk-rce 7 lnk-payloads 7 hta-exploit 7 lnk-builder 7 cmd 7 reg-exploit 7 lnk 7 registry-exploit 7 registry 7 pentest-tool 7 reg 7 doc-builder 6 reg-downloader 6 security-auditing 6 doc-cve 6 doc-malware 6 lnk-cve 6 lnk-exploit 6 office-365 6 doc-payloads 6 security-framework 6 office 6 payload 6 reg-fud 6 vulnerability-exploitation 6 red-teaming 6 security-assessment 6 doc 6 pen-test-tools 6 hta-exploit-builder 6 web-application-security 6 linux 5 framework 5 reconnaissance 5 network-testing 5 exploit-testing 5 cyber-security 5 malware 5 information-gathering 5