Topic: "exploitation-framework"
We5ter/Scanners-Box
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Size: 7.08 MB - Last synced at: 2 months ago - Pushed at: 7 months ago - Stars: 8,427 - Forks: 2,383

EntySec/Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Language: Python - Size: 440 KB - Last synced at: about 2 months ago - Pushed at: 9 months ago - Stars: 2,997 - Forks: 978

Tuhinshubhra/CMSeeK
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
Language: Python - Size: 695 KB - Last synced at: 15 days ago - Pushed at: about 1 year ago - Stars: 2,428 - Forks: 510

0vercl0k/rp
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
Language: C++ - Size: 19.6 MB - Last synced at: 16 days ago - Pushed at: 21 days ago - Stars: 1,938 - Forks: 257

wh1t3p1g/ysomap
A helpful Java Deserialization exploit framework.
Language: Java - Size: 1.54 MB - Last synced at: 8 days ago - Pushed at: 4 months ago - Stars: 1,217 - Forks: 150

nccgroup/featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Language: Python - Size: 768 KB - Last synced at: 20 days ago - Pushed at: over 3 years ago - Stars: 1,106 - Forks: 128

rek7/fireELF
fireELF - Fileless Linux Malware Framework
Language: Python - Size: 143 KB - Last synced at: 12 days ago - Pushed at: about 6 years ago - Stars: 667 - Forks: 112

HexHive/printbf
Brainfuck interpreter inside printf
Language: Brainfuck - Size: 1.34 MB - Last synced at: about 2 months ago - Pushed at: about 4 years ago - Stars: 660 - Forks: 27

jxroot/adbwebkit
ADB For Hackers (:
Language: JavaScript - Size: 3.76 MB - Last synced at: 29 days ago - Pushed at: 2 months ago - Stars: 638 - Forks: 112

vulscanteam/vulscan
vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Language: Python - Size: 49.6 MB - Last synced at: 2 months ago - Pushed at: about 6 years ago - Stars: 627 - Forks: 177

ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework
OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.
Language: Python - Size: 187 MB - Last synced at: 12 days ago - Pushed at: almost 5 years ago - Stars: 531 - Forks: 178

security-cheatsheet/metasploit-cheat-sheet
Metasploit Cheat Sheet 💣
Size: 48.8 KB - Last synced at: 3 months ago - Pushed at: over 5 years ago - Stars: 422 - Forks: 90

j91321/rext
Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.
Language: Python - Size: 1.42 MB - Last synced at: over 1 year ago - Pushed at: over 8 years ago - Stars: 345 - Forks: 119

vulncheck-oss/go-exploit
A Go-based Exploit Framework
Language: Go - Size: 860 KB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 340 - Forks: 37

EntySec/HatSploit
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Language: Python - Size: 8.2 MB - Last synced at: 13 days ago - Pushed at: 6 months ago - Stars: 303 - Forks: 67

aziz0x48/vMass
vMass Bot :hook: Vulnerability Scanner & Auto Exploiter Tool Written in Perl.
Language: Perl - Size: 77.1 KB - Last synced at: about 2 months ago - Pushed at: about 2 years ago - Stars: 194 - Forks: 43

Andy53/ERC.Xdbg
An Xdbg Plugin of the ERC Library.
Language: C# - Size: 1.1 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 178 - Forks: 20

TuuuNya/WebPocket
Exploit management framework
Language: Python - Size: 178 KB - Last synced at: 2 months ago - Pushed at: about 2 years ago - Stars: 152 - Forks: 28

stormshadow07/BeeF-Over-Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Language: Python - Size: 141 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 146 - Forks: 97

Project-Prismatica/Prismatica
Responsive Command and Control System
Language: HTML - Size: 9.21 MB - Last synced at: about 1 year ago - Pushed at: over 2 years ago - Stars: 101 - Forks: 21

152334H/pwnscripts 📦
Very simple script(s) to hasten binary exploit creation
Language: Python - Size: 1.22 MB - Last synced at: 24 days ago - Pushed at: about 4 years ago - Stars: 94 - Forks: 7

ronin-rb/ronin-exploits
A Ruby micro-framework for writing and running exploits
Language: Ruby - Size: 4.05 MB - Last synced at: 4 days ago - Pushed at: 4 months ago - Stars: 76 - Forks: 21

exbotanical/brutus
extensible exploitation framework shipped on a modular multi-tasking architecture
Language: Python - Size: 29.5 MB - Last synced at: about 2 months ago - Pushed at: over 2 years ago - Stars: 76 - Forks: 16

TrixSec/waymap
Waymap is a fast and optimized web vulnerability scanner built for penetration testers. It helps in identifying vulnerabilities by testing against various payloads.
Language: Python - Size: 4.69 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 75 - Forks: 6

jxroot/ReHTTP
Simple Powershell Http shell With WEB UI
Language: PHP - Size: 938 KB - Last synced at: 29 days ago - Pushed at: 2 months ago - Stars: 70 - Forks: 8

VainlyStrain/Vaile
Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)
Language: Python - Size: 19.2 MB - Last synced at: 2 months ago - Pushed at: over 4 years ago - Stars: 65 - Forks: 14

witblack/G3nius-Tools-Sploit
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
Size: 19.5 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 55 - Forks: 9

krishpranav/Backdoorcreator
Exploit toolkit
Language: Python - Size: 109 KB - Last synced at: about 2 months ago - Pushed at: almost 4 years ago - Stars: 55 - Forks: 18

Amzza0x00/Zerooo-Exploitation-Framework
漏洞利用框架
Language: Python - Size: 243 KB - Last synced at: about 2 years ago - Pushed at: almost 3 years ago - Stars: 54 - Forks: 7

whiterabb17/sifter
Sifter - All purpose penetration testing op-center
Language: Shell - Size: 3.39 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 53 - Forks: 12

hwvs/Invoke-GPTObfuscation
Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to obfuscate your PowerShell penetration testing code, malware, or any other sensitive script.
Language: PowerShell - Size: 32.2 KB - Last synced at: 2 months ago - Pushed at: over 1 year ago - Stars: 49 - Forks: 6

Lucifer1993/lasercrack
Lasercrack-可扩展的Ruby暴力破解框架
Language: Ruby - Size: 251 KB - Last synced at: 2 months ago - Pushed at: almost 7 years ago - Stars: 45 - Forks: 14

paulveillard/cybersecurity-windows-exploitation
A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Windows Exploitation.
Size: 406 KB - Last synced at: about 2 months ago - Pushed at: over 1 year ago - Stars: 43 - Forks: 12

FazalMahmood/ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Language: Python - Size: 49.8 KB - Last synced at: over 1 year ago - Pushed at: about 2 years ago - Stars: 42 - Forks: 5

machine1337/OP-FUD
Generate FUD Droppers that are undetectable by popular AV's
Language: Python - Size: 2.93 KB - Last synced at: about 1 month ago - Pushed at: over 1 year ago - Stars: 31 - Forks: 9

TcherB31/Metasploit_Pro_Cracked_v4.21.1
Metasploit - A project dedicated to information security
Language: Ruby - Size: 17.6 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 31 - Forks: 9

scipag/AttackToolKit
Open-source Exploiting Framework
Language: Visual Basic - Size: 449 KB - Last synced at: about 20 hours ago - Pushed at: about 8 years ago - Stars: 30 - Forks: 20

0xInfection/PewSWITCH
A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.
Language: Go - Size: 3.34 MB - Last synced at: 8 days ago - Pushed at: over 3 years ago - Stars: 28 - Forks: 10

AvalZ/RevOK
An HTTP Response fuzzer to find Vulnerabilities in Security Scanners
Language: Python - Size: 2.53 MB - Last synced at: 5 months ago - Pushed at: 12 months ago - Stars: 26 - Forks: 7

Coalfire-Research/ERC.Xdbg
An Xdbg Plugin of the ERC Library.
Language: C# - Size: 1.78 MB - Last synced at: 24 days ago - Pushed at: over 1 year ago - Stars: 26 - Forks: 1

dn9uy3n/Get-Shodan
The program allows to download large data from shodan quickly, simply and avoid errors.
Language: Python - Size: 35.2 KB - Last synced at: almost 2 years ago - Pushed at: over 4 years ago - Stars: 26 - Forks: 10

CroodSolutions/AutoPwnKey
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
Language: AutoHotkey - Size: 1.28 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 25 - Forks: 5

MrSharkSpamBot/GlidingSword
A wacky exploitation framework written in pure python3.
Language: Python - Size: 81.1 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 25 - Forks: 10

paulveillard/cybersecurity-exploit-development
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
Size: 3.87 MB - Last synced at: 2 months ago - Pushed at: almost 3 years ago - Stars: 23 - Forks: 5

sectool/Python-Metasploit-Framework-Database-Management
Python - Metasploit-Framework Database Management
Language: Python - Size: 11.7 KB - Last synced at: about 1 month ago - Pushed at: almost 5 years ago - Stars: 15 - Forks: 11

Cybercrack-bot/Cybercrack
This tool is great for information gathering and post- exploitation
Language: Python - Size: 14.3 MB - Last synced at: over 2 years ago - Pushed at: almost 4 years ago - Stars: 14 - Forks: 10

PinkP4nther/PPF
A modular pentesting framework implemented in C
Language: C - Size: 132 KB - Last synced at: over 1 year ago - Pushed at: almost 7 years ago - Stars: 14 - Forks: 7

dynatrace-oss/invadium 📦
Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.
Language: TypeScript - Size: 1.25 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 10 - Forks: 4

Blacking000/Slient-Url-Exploit-New-Cve-Chrome-Exploit-Html-Downloader-Put-Your-Link
URL Infection (Silent Java Drive By) URL Infection Exploit Silent Java Drive by downloads may happen when visiting a site, opening an e-mail message. It may even happen by clicking on a malicious pop-up window: by clicking on the window in the belief that it concerns an error report from the computer’s OS, for example.
Language: C# - Size: 2 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Blacking000/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted
Language: C++ - Size: 675 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Blacking000/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2022
Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.Silent JPG Exploit There are multiple Exploit JPG in Silent JPG Exploit, a
Language: C++ - Size: 692 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Blacking000/Hta-Exploit-Downloader-Malware-Builder
Features: -Include silent doc exploit -Several exploits, most are sendable via GMail -Compatible with every rat/keylogger/worm -Compatible with Windows XP - Windows 10 32/64 -FUD (DOC CHM) -Works with every MS Office from 2007 to 2016 (excluding Starter edition - there's no macro support) -Startup -base64 encode
Language: C# - Size: 2.86 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

vaibhavkrjha/shufti
All in one OSINT Framework
Language: Shell - Size: 107 KB - Last synced at: over 1 year ago - Pushed at: almost 5 years ago - Stars: 9 - Forks: 4

Caztemaz/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.
Language: Visual Basic .NET - Size: 17.8 MB - Last synced at: about 2 hours ago - Pushed at: about 2 hours ago - Stars: 8 - Forks: 2

jxroot/powtel
Control a system remotely via telegram in Powershell
Language: PowerShell - Size: 16.2 MB - Last synced at: 2 days ago - Pushed at: 2 months ago - Stars: 8 - Forks: 2

AkutoSai/PyReconExSploit-Framework
PyReconExSploit is a Reconnaissance and Exploitation framework written in Python3.
Language: HTML - Size: 8.5 MB - Last synced at: almost 2 years ago - Pushed at: about 5 years ago - Stars: 8 - Forks: 4

Yuweixn/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 113 KB - Last synced at: 28 days ago - Pushed at: 28 days ago - Stars: 7 - Forks: 3

ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 208 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 7 - Forks: 1

DeepakGhengat/psavvy
Programable_Security_Assessment_&_Vulnerability_Verification_System (PSAVVY) framework designed for Recon, vulnerability scanning and exploitation. It features a comprehensive list of Python3 Lambda Functions, equipped with terminal commands, allowing for targeted scanning and autonomous exploitation.
Language: Python - Size: 28.1 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 6 - Forks: 0

actuator/pSlip
pSlip is a Android static analysis toolkit designed primarily to detect components exposing dangerous permissions
Language: Python - Size: 4.98 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 6 - Forks: 0

Conradoduart3/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.
Language: C++ - Size: 674 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 6 - Forks: 7

LakshayD02/Exploit_Development_Framework_C
A C-based exploit development framework and fuzzing tool designed to test application robustness and security by generating random payloads and targeting vulnerabilities. Automate vulnerability discovery and improve application resilience! 🛡️
Language: C - Size: 5.86 KB - Last synced at: about 2 months ago - Pushed at: 4 months ago - Stars: 5 - Forks: 0

cansofficall/aracindir
Language: Shell - Size: 46.9 KB - Last synced at: over 1 year ago - Pushed at: over 4 years ago - Stars: 5 - Forks: 0

unicornsasfuel/featherduster Fork of nccgroup/featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Language: Python - Size: 753 KB - Last synced at: 22 days ago - Pushed at: over 6 years ago - Stars: 5 - Forks: 1

owlinux1000/fsalib 📦
format string attack payload generator
Language: Ruby - Size: 131 KB - Last synced at: 20 days ago - Pushed at: about 7 years ago - Stars: 5 - Forks: 1

NoTrac3/XRAP
🚀 XRAP is not just another payload sender—it's a comprehensive attack platform that combines cutting-edge research with military-grade operational security. With capabilities far beyond typical XSS tools, XRAP delivers zero-click exploitation chains with surgical precision and an unparalleled WAF bypass rate.
Size: 61.5 KB - Last synced at: 14 days ago - Pushed at: 14 days ago - Stars: 4 - Forks: 0

intSpLoiT/intframework
The best Hacking Framework
Language: Python - Size: 7.83 MB - Last synced at: 27 days ago - Pushed at: 27 days ago - Stars: 4 - Forks: 3

iamunixtz/FireHawk
FireHawk: The Elite Firebase Security Testing Utility
Language: Python - Size: 470 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 4 - Forks: 0

grimwaldr/ps-wifi-ducky
PowerShell executing Rubber Ducky USB Drive for acquiring network credentials
Language: PowerShell - Size: 38.1 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 4 - Forks: 0

Arenktugrul/INOVA
Siber güvenlik sektörü için çok yönlü amfibi aracı
Language: Python - Size: 4.45 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 4 - Forks: 0

FOGSEC/routersploit Fork of threat9/routersploit
The Router Exploitation Framework
Language: Python - Size: 860 KB - Last synced at: 2 months ago - Pushed at: over 7 years ago - Stars: 4 - Forks: 1

anil-yelken/automatic-exploit
automatic-exploit
Language: Python - Size: 16.6 KB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 3 - Forks: 4

secana/Beef
Docker image for The Browser Exploitation Framework (Beef)
Language: Dockerfile - Size: 8.79 KB - Last synced at: 3 months ago - Pushed at: over 4 years ago - Stars: 3 - Forks: 4

jxroot/RedVision
collection of custom-designed HTML user interfaces for Command & Control (C2) systems.
Language: HTML - Size: 10.2 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 2 - Forks: 1

USDTC/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Language: C++ - Size: 976 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 2 - Forks: 0

Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
Language: Visual Basic .NET - Size: 13.4 MB - Last synced at: about 3 hours ago - Pushed at: about 3 hours ago - Stars: 1 - Forks: 1

Caztemaz/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
Language: Visual Basic .NET - Size: 12.6 MB - Last synced at: about 3 hours ago - Pushed at: about 3 hours ago - Stars: 1 - Forks: 0

sub2samplays/Metasploit-Framework-2025
Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️
Size: 8.79 KB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 1 - Forks: 0

dustin-ww/ADpwn-modules
This repository contains usable modules for the ADpwn framework. These modules are out of the box and are ready for use.
Language: Go - Size: 0 Bytes - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 1 - Forks: 0

USDTC/Slient-URL-Exploit
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 1.4 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

USDTC/PDF-FUD-Exploit
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 588 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

USDTC/Discord-Image-Logger-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Language: C# - Size: 556 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

Dragce09/Metasploit-Framework-2025
Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️
Size: 1.95 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 1 - Forks: 0

livepwn/hahasecure
"A powerful exploit development toolkit for generating shellcode, creating backdoors, injecting processes, and encoding payloads. Designed for penetration testers and red teamers."
Language: Python - Size: 56.6 KB - Last synced at: 5 days ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

ASMRoyal/0x001829-B
0x001829-B is exploit tool for web servers & for home ip's
Language: C# - Size: 168 KB - Last synced at: 21 days ago - Pushed at: 7 months ago - Stars: 1 - Forks: 0

handler4/taksploit-framework
Taksploit Framework
Language: Python - Size: 697 KB - Last synced at: 9 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

Kittysploit/kittysploit-framework
Language: Python - Size: 515 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 1 - Forks: 0

CarsPound/Slient-PDF-FUD-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 1020 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

GameProfOrg/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2022
package commonly used by web services to process Exploit JPG File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted JPG. The exploit for this vulnerability is being used in the wild.Why Are You Disclosing A Exploit JPG
Language: C++ - Size: 632 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 1 - Forks: 1

CalfCrusher/Exif-Maniac
Post Exploitation Framework via Exif Data in images
Language: Python - Size: 177 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 2

proplayer919/REPP-Router-Exploitation-Python-Program Fork of 3xploit-db/Pentest-Tools-Framework 📦
REPP is a database of exploits, scanners and tools for router hacking. REPP is a powerful framework and includes a lot of tools for beginners
Language: Python - Size: 26.7 MB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 1

DeadlyHollows/Redis-Exploitation-Toolkit
Redis Exploitation Toolkit - A tool to pwn Redis server before the bad guys do!
Language: C - Size: 648 KB - Last synced at: 7 months ago - Pushed at: over 3 years ago - Stars: 1 - Forks: 1

krishpranav/PostExploit
A simple Post Exploitation C2 Tool
Language: Python - Size: 6.84 KB - Last synced at: 2 months ago - Pushed at: almost 4 years ago - Stars: 1 - Forks: 2

tadejgasparovic/helix
Java exploitation framework
Language: Java - Size: 178 KB - Last synced at: about 2 years ago - Pushed at: over 6 years ago - Stars: 1 - Forks: 1

root2ch/CMS_Exploit_Framework
Size: 0 Bytes - Last synced at: over 1 year ago - Pushed at: almost 8 years ago - Stars: 1 - Forks: 0

Geinasz/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection
Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.
Language: Visual Basic .NET - Size: 526 KB - Last synced at: about 3 hours ago - Pushed at: about 3 hours ago - Stars: 0 - Forks: 0

RaizCorp/Discord-Image-Logger-Stealer
Discord Image Logger captures images shared in Discord channels. This project serves as a learning tool for developers interested in understanding how to work with Discord's API. 🐙💻
Language: C# - Size: 181 KB - Last synced at: about 16 hours ago - Pushed at: about 16 hours ago - Stars: 0 - Forks: 0

Ulvexon/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Language: C# - Size: 105 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Quelvara/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 49.8 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

Ulvexon/PDF-FUD-Exploit
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 203 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0
