Packages that takes advantages of exploits in other programs or services.


Tool count: 156

BlackArch exploitation
Name Version Description Homepage
aclpwn 4.81480cc Active Directory ACL exploitation with BloodHound.
aggroargs 51.c032446 Bruteforce commandline buffer overflows, linux, aggressive arguments.
angrop 175.33fdee8 A rop gadget finder and chain builder.
armitage 150813 A graphical cyber attack management tool for Metasploit.
armor 5.bae27a6 A simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
armscgen 98.c51b7d6 ARM Shellcode Generator (Mostly Thumb Mode).
arpoison 0.7 The UNIX arp cache update utility
autosploit 281.9a6a5ef Automate the exploitation of remote hosts.
backoori 55.988e507 Tool aided persistence via Windows URI schemes abuse.
bad-pdf 60.bb7a664 Steal NTLM Hashes with Bad-PDF.
barq 35.6f1a68c An AWS Cloud Post Exploitation framework.
bed 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities.
beef 3859.9d3206b2 The Browser Exploitation Framework that focuses on the web browser.
bfbtester 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows
binex 1.0 Format String exploit building tool.
bitdump 34.6a5cbd8 A tool to extract database data from a blind SQL injection vulnerability.
blind-sql-bitshifting 54.5bbc183 A blind SQL injection module that uses bitshfting to calculate characters.
botb 43.1994fdf A container analysis and exploitation tool for pentesters and engineers.
bowcaster 230.17d69c1 A framework intended to aid those developing exploits.
brosec 277.4b335e5 An interactive reference tool to help security professionals utilize useful payloads and commands.
chw00t 39.1fd1016 Unices chroot breaking tool.
cisco-global-exploiter 1.3 A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.
cisco-torch 0.4b Cisco Torch mass scanning, fingerprinting, and exploitation tool.
cve-search v2.8.r2.gabb5df8 A tool to perform local searches for known vulnerabilities.
darkd0rk3r 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors.
darkmysqli 1.6 Multi-Purpose MySQL Injection Tool
darkspiritz 6.4d23e94 A penetration testing framework for Linux, MacOS, and Windows systems.
delorean 11.2a8b538 NTP Main-in-the-Middle tool.
dkmc 55.35a5a38 Dont kill my cat - Malicious payload evasion tool.
dotdotpwn 3.0.2 The Transversal Directory Fuzzer.
dr-checker 137.d742943 A Soundy Vulnerability Detection Tool for Linux Kernel Drivers.
drinkme 19.acf1a14 A shellcode testing harness.
ducktoolkit 35.7f1e19c Encoding Tools for Rubber Ducky.
encodeshellcode 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code.
enteletaor 66.e8e4daa Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ.
entropy 694.1d60294 A set of tools to exploit Netwave and GoAhead IP Webcams.
evil-winrm 246.e501272 The ultimate WinRM shell for hacking/pentesting.
evilclippy 55.7868777 A cross-platform assistant for creating malicious MS Office documents.
exploit-db 1.6 The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks
exploitdb 20200516 Offensive Security’s Exploit Database Archive
exploitpack 139.e565c47 Exploit Pack - The next generation exploit framework.
eyepwn 1.0 Exploit for Eye-Fi Helper directory traversal vulnerability
fimap 1.00 A little tool for local and remote file inclusion auditing and exploitation
firstexecution 6.a275793 A Collection of different ways to execute code outside of the expected entry points.
flashsploit 23.c465a6d Exploitation Framework for ATtiny85 Based HID Attacks.
formatstringexploiter 29.8d64a56 Helper script for working with format string bugs.
fs-exploit 3.28bb9bb Format string exploit generation.
fuzzbunch 32.2b76c22 NSA Exploit framework
gadgettojscript 14.5ac70f6 .NET serialized gadgets that can trigger .NET assembly from JS/VBS/VBA based scripts.
getsploit 33.5993293 Command line utility for searching and downloading exploits.
ghostdelivery 32.a23ed5a Python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions.
hackredis 3.fbae1bc A simple tool to scan and exploit redis servers.
hamster 2.0.0 Tool for HTTP session sidejacking.
hcraft 1.0.0 HTTP Vuln Request Crafter
heartleech 116.3ab1d60 Scans for systems vulnerable to the heartbleed bug, and then download them.
hqlmap 38.bb6ab46 A tool to exploit HQL Injections.
htexploit 0.77 A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process
htshells 87.fcdca17 Self contained web shells and other attacks via .htaccess files.
inception 450.ffe83ee A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA.
insanity 117.cf51ff3 Generate Payloads and Control Remote Machines .
irpas 0.10 Internetwork Routing Protocol Attack Suite.
isf 68.5228865 An exploitation framework based on Python.
jboss-autopwn 1.3bc2d29 A JBoss script for obtaining remote shell access.
katana 1.0.0.1 A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others).
kernelpop 238.b3467d3 Kernel privilege escalation enumeration and exploitation framework.
killcast 27.450a30a Manipulate Chromecast Devices in your Network.
killerbee 311.13408a6 Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.
l0l 322.1319ea7 The Exploit Development Kit.
leroy-jenkins 3.bdc3965 A python tool that will allow remote execution of commands on a Jenkins server and its nodes.
lfi-autopwn 3.0 A Perl script to try to gain code execution on a remote server via LFI
lisa.py 42.dc4e241 An Exploit Dev Swiss Army Knife.
m3-gen 7.7c656cc Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass, this tool intended for adversary simulation and red teaming purpose.
metasploit 5.0.88 Advanced open-source platform for developing, testing, and using exploit code
minimysqlator 0.5 A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.
miranda-upnp 1.3 A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices
mitmf 467.0458300 A Framework for Man-In-The-Middle attacks written in Python.
mosquito 39.fe54831 XSS exploitation tool - access victims through HTTP proxy.
nosqli-user-pass-enum 18.1b3713a Script to enumerate usernames and passwords from vulnerable web applications running MongoDB.
ntlm-theft 16.26d3213 A tool for generating multiple types of NTLMv2 hash theft files.
opensvp 65.df54ed8 A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack.
osueta 75.0347c48 A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.
otori 0.3 A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities.
owasp-zsc 315.5bb9fed Shellcode/Obfuscate Code Generator.
pacu 943.1b1f07e The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
padbuster 10.320a020 Automated script for performing Padding Oracle attacks.
pathzuzu 64.4f4533c Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables.
pblind 1.0 Little utility to help exploiting blind sql injection vulnerabilities.
pirana 0.3.1 Exploitation framework that tests the security of a email content filter.
pmcma 1.00 Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).
pocsuite 430.877d1b1 An open-sourced remote vulnerability testing framework developed by the Knownsec Security Team.
pompem 141.3ebe768 A python exploit tool finder.
powersploit 590.f94a5d2 A PowerShell Post-Exploitation Framework.
preeny 102.65180c8 Some helpful preload libraries for pwning stuff.
pret 81.4f3820a Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
ps1encode 41.68d7778 A tool to generate and encode a PowerShell based Metasploit payloads.
ptf 1395.9e34ed2 The Penetration Testers Framework: Way for modular support for up-to-date tools.
pykek 12.651b9ba Kerberos Exploitation Kit.
python2-ropgadget 5.9 Pythonic argument parser, that will make you smile.
rebind 0.3.4 DNS Rebinding Tool
rex 582.fd2ced6 Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.
rext 63.5f0f626 Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.
rfcat 170508 RF ChipCon-based Attack Toolset.
richsploit 2.583f553 Exploitation toolkit for RichFaces.
ropeme 4.9b3a8fd A set of python scripts to generate ROP gadgets and payload.
ropgadget 6.3 Search gadgets in binaries to facilitate ROP exploitation for several file formats and architectures
ropper 1.13.5 Show information about binary files and find gadgets to build rop chains for different architectures
roputils 195.ae7ed20 A Return-oriented Programming toolkit.
routersploit 3.4.0 Open-source exploitation framework dedicated to embedded devices
rp 138.3a54a7c A full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries.
rspet 263.de4356e A Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
sc-make 12.7e39718 Tool for automating shellcode creation.
scansploit 9.a0890af Exploit using barcodes, QRcodes, earn13, datamatrix.
seclists 935.dd5960e A collection of multiple types of lists used during security assessments.
sensepost-xrdp 16.46d6c19 A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions.
serialbrute 3.111c217 Java serialization brute force attack tool.
shellcode-compiler 24.e8edc8e Compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows & Linux.
shellcode-factory 96.07ae857 Tool to create and test shellcodes from custom assembly sources.
shellcodecs 0.1 A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process.
shellen 62.3514b7e Interactive shellcoding environment to easily craft shellcodes.
shellme 5.d5206f0 Because sometimes you just need shellcode and opcodes quickly. This essentially just wraps some nasm/objdump calls into a neat script.
shellsploit-framework 273.a16d22f New Generation Exploit Development Kit.
shellter 7.2 A dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
shocker 63.0380a73 A tool to find and exploit servers vulnerable to Shellshock.
sickle 72.d22be3b A shellcode development tool, created to speed up the various steps needed to create functioning shellcode.
sigploit 786.0e52072 Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP.
sigthief 14.211b4fe Stealing Signatures and Making One Invalid Signature at a Time.
sjet 27.2d52f0c Siberas JMX exploitation toolkit.
smap 24.3ed1ac7 Shellcode mapper - Handy tool for shellcode analysis.
smtptester 13.634e1ee Small python3 tool to check common vulnerabilities in SMTP servers.
snarf-mitm 41.bada142 SMB Man in the Middle Attack Engine / relay suite.
spraykatz 62.1fb3aa7 Credentials gathering tool automating remote procdump and parse of lsass process.
sqlninja 0.2.999 A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.
sqlsus 0.7.2 An open source MySQL injection and takeover tool, written in perl
ssh-mitm 118.6f042a1 SSH man-in-the-middle tool.
stackflow 2.2af525d Universal stack-based buffer overfow exploitation tool.
staekka 9.57787ca This plugin extends Metasploit for some missing features and modules allowing interaction with other/custom exploits/ways of getting shell access.
subterfuge 64.69dda99 Automated Man-in-the-Middle Attack Framework.
suid3num 36.911b6c8 Python script which utilizes python's built-in modules to enumerate SUID binaries.
tcpjunk 2.9.03 A general tcp protocols testing and hacking utility.
tomcatwardeployer 91.a1a4453 Apache Tomcat auto WAR deployment & pwning penetration testing tool.
unibrute 1.b3fb4b7 Multithreaded SQL union bruteforcer.
viproy-voipkit 81.427f26e VoIP Pen-Test Kit for Metasploit Framework
vmap 0.3 A Vulnerability-Exploit desktop finder.
webexploitationtool 155.85bcf0e A cross platform web exploitation toolkit.
websploit 4.0.4 An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks
wesng 121.e966bb2 Windows Exploit Suggester - Next Generation.
wildpwn 11.4623714 Unix wildcard attacks.
wsuspect-proxy 24.89f9375 A tool for MITM'ing insecure WSUS connections.
xcat 264.f08fc6f A command line tool to automate the exploitation of blind XPath injection vulnerabilities.
xpl-search 42.d4dbc97 Search exploits in multiple exploit databases!.
xrop 83.4af7452 Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC.
xxeinjector 53.8c5c70e Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.
yinjector 0.1 A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.
zarp 0.1.8 A network attack tool centered around the exploitation of local networks.
zeratool 16.157d9fd Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems.
zirikatu 7.afe1d9c Fud Payload generator script.