aclpwn |
4.81480cc |
Active Directory ACL exploitation with BloodHound. |
|
adenum |
36.fbbe14d |
A pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos. |
|
aggroargs |
51.c032446 |
Bruteforce commandline buffer overflows, linux, aggressive arguments. |
|
angrop |
408.15616aa |
A rop gadget finder and chain builder. |
|
armitage |
150813 |
A graphical cyber attack management tool for Metasploit. |
|
armor |
5.bae27a6 |
A simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners. |
|
armscgen |
98.c51b7d6 |
ARM Shellcode Generator (Mostly Thumb Mode). |
|
arpoison |
0.7 |
The UNIX arp cache update utility |
|
autosploit |
281.9a6a5ef |
Automate the exploitation of remote hosts. |
|
backoori |
55.988e507 |
Tool aided persistence via Windows URI schemes abuse. |
|
bad-pdf |
61.a8149ee |
Steal NTLM Hashes with Bad-PDF. |
|
barq |
35.6f1a68c |
An AWS Cloud Post Exploitation framework. |
|
bed |
0.5 |
Collection of scripts to test for buffer overflows, format string vulnerabilities. |
|
beef |
4619.aa526037 |
The Browser Exploitation Framework that focuses on the web browser. |
|
beroot |
1.0.1.r109.g4c0b648 |
A post exploitation tool to check common misconfigurations to find a way to escalate our privilege. |
|
bfbtester |
2.0.1 |
Performs checks of single and multiple argument command line overflows and environment variable overflows |
|
binex |
1.0 |
Format String exploit building tool. |
|
bitdump |
34.6a5cbd8 |
A tool to extract database data from a blind SQL injection vulnerability. |
|
blind-sql-bitshifting |
54.5bbc183 |
A blind SQL injection module that uses bitshfting to calculate characters. |
|
bloodyad |
203.077892e |
An Active Directory Privilege Escalation Framework. |
|
bluffy |
47.180ed5b |
Convert shellcode into different formats. |
|
botb |
69.6d33aae |
A container analysis and exploitation tool for pentesters and engineers. |
|
bowcaster |
230.17d69c1 |
A framework intended to aid those developing exploits. |
|
brosec |
278.c51164f |
An interactive reference tool to help security professionals utilize useful payloads and commands. |
|
camover |
94.483befd |
A camera exploitation tool that allows to disclosure network camera admin password. |
|
certsync |
0.1.6 |
Dump NTDS remotely without DRSUAPI: using golden certificate and UnPAC the hash. |
|
chw00t |
39.1fd1016 |
Unices chroot breaking tool. |
|
cisco-global-exploiter |
1.3 |
A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products. |
|
cisco-torch |
0.4b |
Cisco Torch mass scanning, fingerprinting, and exploitation tool. |
|
coercer |
2.4.3 |
Coerce a Windows server to authenticate on an arbitrary machine through 15 methods. |
|
cve-search |
v5.1.0.r4.g471ccfb |
A tool to perform local searches for known vulnerabilities. |
|
cvemap |
v0.0.7.r207.g16e19ca |
CLI tool designed to provide a structured and easily navigable interface to various vulnerability databases. |
|
darkd0rk3r |
1.0 |
Python script that performs dork searching and searches for local file inclusion and SQL injection errors. |
|
darkmysqli |
1.6 |
Multi-Purpose MySQL Injection Tool |
|
darkspiritz |
6.4d23e94 |
A penetration testing framework for Linux, MacOS, and Windows systems. |
|
deepce |
119.c1bb2ca |
Docker Enumeration, Escalation of Privileges and Container Escapes. |
|
delorean |
16.0291151 |
NTP Main-in-the-Middle tool. |
|
dkmc |
56.3c238f0 |
Dont kill my cat - Malicious payload evasion tool. |
|
dotdotpwn |
3.0.2 |
The Transversal Directory Fuzzer. |
|
dr-checker |
140.ea63c0f |
A Soundy Vulnerability Detection Tool for Linux Kernel Drivers. |
|
drinkme |
19.acf1a14 |
A shellcode testing harness. |
|
ducktoolkit |
37.42da733 |
Encoding Tools for Rubber Ducky. |
|
encodeshellcode |
0.1b |
This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code. |
|
enteletaor |
68.a975b5c |
Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ. |
|
entropy |
702.13aac50 |
A set of tools to exploit Netwave and GoAhead IP Webcams. |
|
erl-matter |
53.ab793cd |
Tool to exploit epmd related services such as rabbitmq, ejabberd and couchdb by bruteforcing the cookie and gaining RCE afterwards. |
|
evil-winrm |
v3.7.r0.gffe958c |
The ultimate WinRM shell for hacking/pentesting. |
|
evilclippy |
62.fa610c6 |
A cross-platform assistant for creating malicious MS Office documents. |
|
exploit-db |
1.6 |
The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks |
|
exploitpack |
139.e565c47 |
Exploit Pack - The next generation exploit framework. |
|
eyepwn |
1.0 |
Exploit for Eye-Fi Helper directory traversal vulnerability |
|
ffm |
129.6337eaf |
A hacking harness that you can use during the post-exploitation phase of a red-teaming engagement. |
|
fimap |
1.00 |
A little tool for local and remote file inclusion auditing and exploitation |
|
firstexecution |
6.a275793 |
A Collection of different ways to execute code outside of the expected entry points. |
|
flashsploit |
23.c465a6d |
Exploitation Framework for ATtiny85 Based HID Attacks. |
|
formatstringexploiter |
107.2810293 |
Helper script for working with format string bugs. |
|
fs-exploit |
3.28bb9bb |
Format string exploit generation. |
|
fuzzbunch |
32.2b76c22 |
NSA Exploit framework |
|
gadgettojscript |
20.005cb8b |
.NET serialized gadgets that can trigger .NET assembly from JS/VBS/VBA based scripts. |
|
getsploit |
37.bcab2ee |
Command line utility for searching and downloading exploits. |
|
ghostdelivery |
32.a23ed5a |
Python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions. |
|
hackredis |
3.fbae1bc |
A simple tool to scan and exploit redis servers. |
|
hamster |
2.0.0 |
Tool for HTTP session sidejacking. |
|
hcraft |
1.0.0 |
HTTP Vuln Request Crafter |
|
heartleech |
116.3ab1d60 |
Scans for systems vulnerable to the heartbleed bug, and then download them. |
|
hqlmap |
38.bb6ab46 |
A tool to exploit HQL Injections. |
|
htexploit |
0.77 |
A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process |
|
htshells |
89.3216523 |
Self contained web shells and other attacks via .htaccess files. |
|
impacket-ba |
0.12.0 |
Collection of classes for working with network protocols. |
|
inception |
454.4df3231 |
A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA. |
|
insanity |
117.cf51ff3 |
Generate Payloads and Control Remote Machines . |
|
irpas |
0.10 |
Internetwork Routing Protocol Attack Suite. |
|
isf |
68.5228865 |
An exploitation framework based on Python. |
|
jboss-autopwn |
1.3bc2d29 |
A JBoss script for obtaining remote shell access. |
|
jndi-injection-exploit |
10.2dc4018 |
A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability, like Jackson, Fastjson, etc. |
|
katana-framework |
1.0.0.1 |
A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others). |
|
kerberoast |
0.2.0.r9.g82f5bb2 |
Kerberoast attack -pure python-. |
|
kernelpop |
238.b3467d3 |
Kernel privilege escalation enumeration and exploitation framework. |
|
killcast |
30.ee81cfa |
Manipulate Chromecast Devices in your Network. |
|
killerbee |
398.748740d |
Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks. |
|
klar |
2.4.0 |
Integration of Clair and Docker Registry. |
|
l0l |
322.1319ea7 |
The Exploit Development Kit. |
|
leroy-jenkins |
3.bdc3965 |
A python tool that will allow remote execution of commands on a Jenkins server and its nodes. |
|
lfi-autopwn |
3.0 |
A Perl script to try to gain code execution on a remote server via LFI |
|
limelighter |
17.d119dc7 |
A tool for generating fake code signing certificates or signing real ones. |
|
lisa.py |
61.2d1f81a |
An Exploit Dev Swiss Army Knife. |
|
m3-gen |
7.7c656cc |
Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass, this tool intended for adversary simulation and red teaming purpose. |
|
marshalsec |
10.2dc4018 |
Java Unmarshaller Security - Turning your data into code execution. |
|
minimysqlator |
0.5 |
A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities. |
|
miranda-upnp |
1.3 |
A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices |
|
mitmf |
467.0458300 |
A Framework for Man-In-The-Middle attacks written in Python. |
|
moonwalk |
v1.0.0.r18.g68d5be1 |
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. |
|
mosquito |
39.fe54831 |
XSS exploitation tool - access victims through HTTP proxy. |
|
myjwt |
202.719b939 |
This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject, etc. |
|
n1qlmap |
2.5365444 |
An N1QL exploitation tool. |
|
nosqli-user-pass-enum |
18.1b3713a |
Script to enumerate usernames and passwords from vulnerable web applications running MongoDB. |
|
ntlm-theft |
26.512074d |
A tool for generating multiple types of NTLMv2 hash theft files. |
|
office-dde-payloads |
34.53291f9 |
Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique. |
|
opensvp |
65.df54ed8 |
A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack. |
|
osueta |
82.2ee8068 |
A simple Python script to exploit the OpenSSH User Enumeration Timing Attack. |
|
otori |
0.3 |
A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities. |
|
owasp-zsc |
316.f763dea |
Shellcode/Obfuscate Code Generator. |
|
pacu |
1520.d4c2314 |
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments. |
|
pathzuzu |
64.4f4533c |
Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables. |
|
pblind |
1.0 |
Little utility to help exploiting blind sql injection vulnerabilities. |
|
phantom-evasion |
103.2cd0673 |
Antivirus evasion tool written in python. |
|
pirana |
0.3.1 |
Exploitation framework that tests the security of a email content filter. |
|
pkinittools |
10.7311de8 |
Tools for Kerberos PKINIT and relaying to AD CS. |
|
pmcma |
1.00 |
Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption). |
|
pocsuite |
430.877d1b1 |
An open-sourced remote vulnerability testing framework developed by the Knownsec Security Team. |
|
pompem |
141.3ebe768 |
A python exploit tool finder. |
|
powersploit |
591.d943001 |
A PowerShell Post-Exploitation Framework. |
|
preeny |
110.aaef77f |
Some helpful preload libraries for pwning stuff. |
|
pret |
108.a04bd04 |
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete. |
|
ps1encode |
41.68d7778 |
A tool to generate and encode a PowerShell based Metasploit payloads. |
|
ptf |
1517.74f58d6 |
The Penetration Testers Framework: Way for modular support for up-to-date tools. |
|
punk |
9.c2bc420 |
A post-exploitation tool meant to help network pivoting from a compromised unix box. |
|
pwncat-caleb |
v0.5.4.r11.g37f04d4 |
A post-exploitation platform. |
|
pykek |
12.651b9ba |
Kerberos Exploitation Kit. |
|
python-ssh-mitm |
5.0.0 |
SSH mitm server for security audits supporting public key authentication, session hijacking and file manipulation. |
|
python2-ropgadget |
5.9 |
Pythonic argument parser, that will make you smile. |
|
rebind |
0.3.4 |
DNS Rebinding Tool |
|
rex |
714.0cb89f9 |
Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge. |
|
rext |
63.5f0f626 |
Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices. |
|
richsploit |
3.6b15e0f |
Exploitation toolkit for RichFaces. |
|
rmiscout |
1.4 |
Enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities. |
|
rombuster |
223.4592b7a |
A router exploitation tool that allows to disclosure network router admin password. |
|
ropeme |
4.9b3a8fd |
A set of python scripts to generate ROP gadgets and payload. |
|
roputils |
195.ae7ed20 |
A Return-oriented Programming toolkit. |
|
rp |
138.3a54a7c |
A full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. |
|
rspet |
263.de4356e |
A Python based reverse shell equipped with functionalities that assist in a post exploitation scenario. |
|
sc-make |
12.7e39718 |
Tool for automating shellcode creation. |
|
scansploit |
9.a0890af |
Exploit using barcodes, QRcodes, earn13, datamatrix. |
|
sensepost-xrdp |
16.46d6c19 |
A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions. |
|
serialbrute |
3.111c217 |
Java serialization brute force attack tool. |
|
shellcode-compiler |
26.8a25463 |
Compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows & Linux. |
|
shellcode-factory |
96.07ae857 |
Tool to create and test shellcodes from custom assembly sources. |
|
shellcodecs |
0.1 |
A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process. |
|
shellen |
66.c0c5f83 |
Interactive shellcoding environment to easily craft shellcodes. |
|
shellme |
5.d5206f0 |
Because sometimes you just need shellcode and opcodes quickly. This essentially just wraps some nasm/objdump calls into a neat script. |
|
shellsploit-framework |
273.a16d22f |
New Generation Exploit Development Kit. |
|
shellter |
7.2 |
A dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. |
|
shocker |
65.65d4d76 |
A tool to find and exploit servers vulnerable to Shellshock. |
|
sickle |
100.83aa243 |
A shellcode development tool, created to speed up the various steps needed to create functioning shellcode. |
|
sigploit |
786.0e52072 |
Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP. |
|
sigthief |
25.ffb501b |
Stealing Signatures and Making One Invalid Signature at a Time. |
|
sireprat |
34.b8ef60b |
Remote Command Execution as SYSTEM on Windows IoT Core. |
|
sjet |
103.dd2a4e6 |
Siberas JMX exploitation toolkit. |
|
smap |
24.3ed1ac7 |
Shellcode mapper - Handy tool for shellcode analysis. |
|
smtptester |
13.634e1ee |
Small python3 tool to check common vulnerabilities in SMTP servers. |
|
snarf-mitm |
41.bada142 |
SMB Man in the Middle Attack Engine / relay suite. |
|
spraykatz |
62.1fb3aa7 |
Credentials gathering tool automating remote procdump and parse of lsass process. |
|
sqlninja |
0.2.999 |
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. |
|
sqlsus |
0.7.2 |
An open source MySQL injection and takeover tool. |
|
ssh-mitm |
140.70998ba |
SSH man-in-the-middle tool. |
|
sstimap |
v1.2.r3.g0d45b44 |
Automatic SSTI detection tool with interactive interface. |
|
stackflow |
2.2af525d |
Universal stack-based buffer overfow exploitation tool. |
|
staekka |
9.57787ca |
This plugin extends Metasploit for some missing features and modules allowing interaction with other/custom exploits/ways of getting shell access. |
|
subterfuge |
64.69dda99 |
Automated Man-in-the-Middle Attack Framework. |
|
suid3num |
60.2241c9c |
Python script which utilizes python's built-in modules to enumerate SUID binaries. |
|
tcpjunk |
2.9.03 |
A general tcp protocols testing and hacking utility. |
|
tomcatwardeployer |
98.4535e64 |
Apache Tomcat auto WAR deployment & pwning penetration testing tool. |
|
unibrute |
1.b3fb4b7 |
Multithreaded SQL union bruteforcer. |
|
venom |
135.2b84e68 |
A Multi-hop Proxy for Penetration Testers. |
|
viproy-voipkit |
82.52b27db |
VoIP Pen-Test Kit for Metasploit Framework. |
|
vmap |
0.3 |
A Vulnerability-Exploit desktop finder. |
|
volana |
v1.0.0.r26.g6dbf9a4 |
Shell command obfuscation to avoid detection systems. |
|
webexploitationtool |
155.85bcf0e |
A cross platform web exploitation toolkit. |
|
websploit |
4.0.4 |
An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks |
|
wesng |
378.e75696f |
Windows Exploit Suggester - Next Generation. |
|
wildpwn |
11.4623714 |
Unix wildcard attacks. |
|
wsuspect-proxy |
24.89f9375 |
A tool for MITM'ing insecure WSUS connections. |
|
xcat |
266.faaf8fe |
A command line tool to automate the exploitation of blind XPath injection vulnerabilities. |
|
xpl-search |
42.d4dbc97 |
Search exploits in multiple exploit databases!. |
|
xrop |
83.4af7452 |
Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC. |
|
xxeinjector |
56.150067a |
Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods. |
|
xxexploiter |
103.c1f0f41 |
It generates the XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration. |
|
yinjector |
0.1 |
A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods. |
|
zarp |
0.1.8 |
A network attack tool centered around the exploitation of local networks. |
|
zeratool |
48.3fb3262 |
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems. |
|
zirikatu |
7.afe1d9c |
Fud Payload generator script. |
|