Packages that takes advantages of exploits in other programs or services.


Tool count: 139

BlackArch exploitation
Name Version Description Homepage
aggroargs 51.c032446 Bruteforce commandline buffer overflows, linux, aggressive arguments.
angrop 166.7917e25 A rop gadget finder and chain builder.
armitage 150813 A graphical cyber attack management tool for Metasploit.
armor 5.bae27a6 A simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
armscgen 98.c51b7d6 ARM Shellcode Generator (Mostly Thumb Mode).
arpoison 0.7 The UNIX arp cache update utility
autosploit 279.8ee8ea1 Automate the exploitation of remote hosts.
bad-pdf 59.ff7cc84 Steal NTLM Hashes with Bad-PDF.
bed 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities.
beef 3322.d6972adf The Browser Exploitation Framework that focuses on the web browser.
bfbtester 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows
binex 1.0 Format String exploit building tool.
bitdump 34.6a5cbd8 A tool to extract database data from a blind SQL injection vulnerability.
blind-sql-bitshifting 54.5bbc183 A blind SQL injection module that uses bitshfting to calculate characters.
bowcaster 230.17d69c1 A framework intended to aid those developing exploits.
brosec 277.4b335e5 An interactive reference tool to help security professionals utilize useful payloads and commands.
chw00t 39.1fd1016 Unices chroot breaking tool.
cisco-global-exploiter 1.3 A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.
cisco-torch 0.4b Cisco Torch mass scanning, fingerprinting, and exploitation tool.
cve-search v2.6.r0.gd0f6ded A tool to perform local searches for known vulnerabilities.
darkd0rk3r 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors.
darkmysqli 1.6 Multi-Purpose MySQL Injection Tool
darkspiritz 6.4d23e94 A penetration testing framework for Linux, MacOS, and Windows systems.
delorean 11.2a8b538 NTP Main-in-the-Middle tool.
dkmc 52.eb47d3c Dont kill my cat - Malicious payload evasion tool.
dotdotpwn 3.0.2 The Transversal Directory Fuzzer.
dr-checker 137.d742943 A Soundy Vulnerability Detection Tool for Linux Kernel Drivers.
drinkme 19.acf1a14 A shellcode testing harness.
encodeshellcode 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code.
enteletaor 65.d1fbda5 Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ.
evilclippy 44.a875ffa A cross-platform assistant for creating malicious MS Office documents.
exploit-db 1.6 The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks
exploitdb 20191024 Offensive Security’s Exploit Database Archive
exploitpack 139.e565c47 Exploit Pack - The next generation exploit framework.
eyepwn 1.0 Exploit for Eye-Fi Helper directory traversal vulnerability
fimap 1.00 A little tool for local and remote file inclusion auditing and exploitation
firstexecution 6.a275793 A Collection of different ways to execute code outside of the expected entry points.
flashsploit 22.e95a4f4 Exploitation Framework for ATtiny85 Based HID Attacks.
formatstringexploiter 29.8d64a56 Helper script for working with format string bugs.
fs-exploit 3.28bb9bb Format string exploit generation.
getsploit 33.5993293 Command line utility for searching and downloading exploits.
ghostdelivery 30.867fe85 Python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions.
hackredis 3.fbae1bc A simple tool to scan and exploit redis servers.
hamster 2.0.0 Tool for HTTP session sidejacking.
hcraft 1.0.0 HTTP Vuln Request Crafter
heartleech 116.3ab1d60 Scans for systems vulnerable to the heartbleed bug, and then download them.
hqlmap 38.bb6ab46 A tool to exploit HQL Injections.
htexploit 0.77 A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process
htshells 87.fcdca17 Self contained web shells and other attacks via .htaccess files.
inception 450.ffe83ee A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA.
insanity 117.cf51ff3 Generate Payloads and Control Remote Machines .
irpas 0.10 Internetwork Routing Protocol Attack Suite.
isf 67.91bde83 An exploitation framework based on Python.
jboss-autopwn 1.3bc2d29 A JBoss script for obtaining remote shell access.
katana 1.0.0.1 A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others).
kernelpop 238.b3467d3 Kernel privilege escalation enumeration and exploitation framework.
killcast 26.49d4065 Manipulate Chromecast Devices in your Network.
killerbee 303.354c68b Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.
l0l 322.1319ea7 The Exploit Development Kit.
leroy-jenkins 3.bdc3965 A python tool that will allow remote execution of commands on a Jenkins server and its nodes.
lfi-autopwn 3.0 A Perl script to try to gain code execution on a remote server via LFI
lisa.py 42.dc4e241 An Exploit Dev Swiss Army Knife.
metasploit 5.0.60 Advanced open-source platform for developing, testing, and using exploit code
minimysqlator 0.5 A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.
miranda-upnp 1.3 A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices
mitmf 467.0458300 A Framework for Man-In-The-Middle attacks written in Python.
mosquito 39.fe54831 XSS exploitation tool - access victims through HTTP proxy.
opensvp 65.df54ed8 A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack.
osueta 75.0347c48 A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.
otori 0.3 A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities.
owasp-zsc 314.fdc06a0 Shellcode/Obfuscate Code Generator.
padbuster 10.320a020 Automated script for performing Padding Oracle attacks.
pathzuzu 64.4f4533c Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables.
pblind 1.0 Little utility to help exploiting blind sql injection vulnerabilities.
pirana 0.3.1 Exploitation framework that tests the security of a email content filter.
pmcma 1.00 Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).
pocsuite 430.877d1b1 An open-sourced remote vulnerability testing framework developed by the Knownsec Security Team.
pompem 141.3ebe768 A python exploit tool finder.
powersploit 476.c7985c9 A PowerShell Post-Exploitation Framework.
preeny 101.4a67ed9 Some helpful preload libraries for pwning stuff.
pret 81.4f3820a Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
ps1encode 41.68d7778 A tool to generate and encode a PowerShell based Metasploit payloads.
ptf 1187.79a48cf The Penetration Testers Framework: Way for modular support for up-to-date tools.
pykek 12.651b9ba Kerberos Exploitation Kit.
python2-ropgadget 5.9 Pythonic argument parser, that will make you smile.
rebind 0.3.4 DNS Rebinding Tool
rex 576.4077508 Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.
rext 63.5f0f626 Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.
rfcat 170508 RF ChipCon-based Attack Toolset.
ropeme 4.9b3a8fd A set of python scripts to generate ROP gadgets and payload.
ropgadget 5.7 Search gadgets in binaries to facilitate ROP exploitation for several file formats and architectures
ropper 1.13.4 Show information about binary files and find gadgets to build rop chains for different architectures
roputils 195.ae7ed20 A Return-oriented Programming toolkit.
routersploit 3.4.0 Open-source exploitation framework dedicated to embedded devices
rp 138.3a54a7c A full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries.
rspet 263.de4356e A Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
sc-make 12.7e39718 Tool for automating shellcode creation.
scansploit 9.a0890af Exploit using barcodes, QRcodes, earn13, datamatrix.
sensepost-xrdp 16.46d6c19 A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions.
serialbrute 3.111c217 Java serialization brute force attack tool.
shellcode-factory 96.07ae857 Tool to create and test shellcodes from custom assembly sources.
shellcodecs 0.1 A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process.
shellen 62.3514b7e Interactive shellcoding environment to easily craft shellcodes.
shellme 5.d5206f0 Because sometimes you just need shellcode and opcodes quickly. This essentially just wraps some nasm/objdump calls into a neat script.
shellsploit-framework 273.a16d22f New Generation Exploit Development Kit.
shellter 7.1 A dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
shocker 63.0380a73 A tool to find and exploit servers vulnerable to Shellshock.
sickle 63.692e56a A shellcode development tool, created to speed up the various steps needed to create functioning shellcode.
sigploit 786.0e52072 Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP.
sigthief 14.211b4fe Stealing Signatures and Making One Invalid Signature at a Time.
sjet 27.2d52f0c Siberas JMX exploitation toolkit.
smap 24.3ed1ac7 Shellcode mapper - Handy tool for shellcode analysis.
smtptester 13.634e1ee Small python3 tool to check common vulnerabilities in SMTP servers.
snarf-mitm 41.bada142 SMB Man in the Middle Attack Engine / relay suite.
sqlninja 0.2.999 A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.
sqlsus 0.7.2 An open source MySQL injection and takeover tool, written in perl
ssh-mitm 118.6f042a1 SSH man-in-the-middle tool.
stackflow 2.2af525d Universal stack-based buffer overfow exploitation tool.
staekka 9.57787ca This plugin extends Metasploit for some missing features and modules allowing interaction with other/custom exploits/ways of getting shell access.
subterfuge 64.69dda99 Automated Man-in-the-Middle Attack Framework.
suid3num 19.ea6fe97 Python script which utilizes python's built-in modules to enumerate SUID binaries.
tcpjunk 2.9.03 A general tcp protocols testing and hacking utility.
tomcatwardeployer 91.a1a4453 Apache Tomcat auto WAR deployment & pwning penetration testing tool.
unibrute 1.b3fb4b7 Multithreaded SQL union bruteforcer.
viproy-voipkit 81.427f26e VoIP Pen-Test Kit for Metasploit Framework
vmap 0.3 A Vulnerability-Exploit desktop finder.
webexploitationtool 155.85bcf0e A cross platform web exploitation toolkit.
websploit 3.0.0 An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks
wesng 89.24b9004 Windows Exploit Suggester - Next Generation.
wildpwn 11.4623714 Unix wildcard attacks.
wsuspect-proxy 24.89f9375 A tool for MITM'ing insecure WSUS connections.
xcat 257.9620593 A command line tool to automate the exploitation of blind XPath injection vulnerabilities.
xpl-search 42.d4dbc97 Search exploits in multiple exploit databases!.
xrop 83.4af7452 Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC.
xxeinjector 53.8c5c70e Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.
yinjector 0.1 A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.
zarp 0.1.8 A network attack tool centered around the exploitation of local networks.
zeratool 15.d4dda1a Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems.
zirikatu 7.afe1d9c Fud Payload generator script.