Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python exploitation
exploitation
x
python
x
252 search results found
Pretty
⭐
181
"PRinter Exploitation Toolkit" LAN automation tool
Vmware_vcenter_cve_2020_3952
⭐
181
Exploit for CVE-2020-3952 in vCenter 6.7
Expdevbadchars
⭐
179
Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
Jiraffe
⭐
178
One stop place for exploiting Jira instances in your proximity
Smbghost_automateexploitation
⭐
175
SMBGhost (CVE-2020-0796) Automate Exploitation and Detection
Shannonre
⭐
175
Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S6
Csrft
⭐
173
A lightweight CSRF Toolkit for easy Proof of concept
Scavenger
⭐
173
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as "interesting" files containing sensitive information.
Cve 2017 8570
⭐
172
Proof of Concept exploit for CVE-2017-8570
Exploit Discord Cache System Poc
⭐
170
🗄️ Exploit Discord's cache system to remote upload payloads to Discord users machines (possible malware dropper for e.g. targeting specific victims)
Expcamera
⭐
169
Exploit Netwave and GoAhead IP Camera
Weblogic_unserialize_exploit
⭐
169
java unserialize vul for weblogic exploit
Ntlm Scanner
⭐
167
A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities
Cisco Rce
⭐
166
CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC
Buffer Overflow Exploit Development Practice
⭐
163
Good For OSCP Training
Hackembedded
⭐
161
This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices
Heapinspect
⭐
160
🔍Heap analysis tool for CTF pwn.
Exploits
⭐
160
Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Cve 2023 46747 Rce
⭐
159
exploit for f5-big-ip RCE cve-2023-46747
Ps4 3.55 Code Execution Poc
⭐
159
Beehive
⭐
156
Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
Crashcast Exploit
⭐
156
This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io
Sweyntooth_bluetooth_low_energy_attacks
⭐
156
Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.
Insecure Firebase Exploit
⭐
154
A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase db.
Ropa
⭐
152
GUI tool to create ROP chains using the ropper API
Osueta
⭐
151
A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.
Ispy
⭐
150
ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )
Lfimap
⭐
150
Local File Inclusion discovery and exploitation tool
Cve 2016 6366
⭐
150
Public repository for improvements to the EXTRABACON exploit
Patrowlhears
⭐
150
PatrowlHears - Vulnerability Intelligence Center / Exploits
R00kie Kr00kie
⭐
148
PoC exploit for the CVE-2019-15126 kr00k vulnerability
Isf
⭐
147
ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.
Race Condition Exploit
⭐
146
Tool to help with the exploitation of web application race conditions
Ida Sploiter
⭐
145
IDA Sploiter is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's capabilities as an exploit development and vulnerability research tool.
Pwnshop
⭐
144
Exploit Development, Reverse Engineering & Cryptography
Firehorse
⭐
144
Research & Exploitation framework for Qualcomm EDL Firehose programmers
Shellfire
⭐
143
An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.
Cve 2020 1350 Dos
⭐
142
A denial-of-service proof-of-concept for CVE-2020-1350
Pentest Tools Framework
⭐
140
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Wpaxfuzz
⭐
140
A full-featured open-source Wi-Fi fuzzer
Exploit Framework
⭐
139
🔥 An Exploit framework for Web Vulnerabilities written in Python
Scriptsandexploits
⭐
137
Some scripts and exploits
Beemka
⭐
136
Basic Electron Exploitation
Write Ups
⭐
134
Write-ups for various CTF
Cve 2020 1472
⭐
134
Exploit Code for CVE-2020-1472 aka Zerologon
Libc Got Hijacking
⭐
133
Binary Exploitation Skill. Gain RCE from arbitrary write.
Cve_searchsploit
⭐
133
Search an exploit in the local exploitdb database by its CVE
Not Your Average Web Crawler
⭐
130
A web crawler (for bug hunting) that gathers more than you can imagine.
Shuriken
⭐
130
Cross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.
Gef Extras
⭐
129
Extra goodies for GEF to (try to) make GDB suck even less
3dpwn
⭐
128
VirtualBox 3D exploits & PoCs
Leakless
⭐
128
Function redirection via ELF tricks.
Spoolsploit
⭐
127
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
Vailyn
⭐
126
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Cve 2018 8174_exp
⭐
125
CVE-2018-8174_python
Cve 2019 11539
⭐
125
Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect
Oneplustwobot
⭐
125
A series of exploits used to jump the OnePlus reservation queue.
Pysqli
⭐
125
Python SQL injection framework
Exploits
⭐
124
Some exploits and exploit development stuff.
Windows_exploit_dowser
⭐
124
A simple tool which could be useful to identify the exploits afflicting a Windows OS
Activedirectoryenumeration
⭐
123
Enumerate AD through LDAP with a collection of helpfull scripts being bundled
Hatvenom
⭐
122
HatVenom is a powerful payload generation tool that provides support for all common platforms and architectures.
Cve 2019 11043
⭐
121
(PoC) Python version of CVE-2019-11043 exploit by neex
Drozer Modules
⭐
121
Inspector
⭐
120
The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, check kernel version, check history file, get possible exploit ...
35c3_modern_windows_userspace_exploitation
⭐
120
Infosec And Hacking Scripts
⭐
118
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
Safiler
⭐
117
Safari local file reader
Blueborne Scanner
⭐
116
Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit
Cve 2018 11776 Python Poc
⭐
115
Working Python test and PoC for CVE-2018-11776, includes Docker lab
Camera Exploit Tool
⭐
113
Automated exploit scanner for cameras on the internet
Flashsploit
⭐
111
Exploitation Framework for ATtiny85 Based HID Attacks
Davscan
⭐
111
Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.
Win7blue
⭐
110
Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits
Ctflearn Writeups
⭐
110
CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and other Misc problems.
Shonydanza
⭐
110
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Sjet
⭐
108
siberas JMX exploitation toolkit
Blisqy
⭐
107
Version 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
Cve 2020 0688_exp
⭐
106
CVE-2020-0688_EXP Auto trigger payload & encrypt method
Albatar
⭐
106
Albatar is a SQLi exploitation framework in Python
Exploit Development Tools
⭐
106
A bunch of my exploit development helper tools, collected in one place.
Tp5 Getshell
⭐
105
thinkphp5 rce getshell
Mqtt Pwn
⭐
105
MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
Security
⭐
105
General Security Scripts
Uefi_boot_script_expl
⭐
105
CHIPSEC module that exploits UEFI boot script table vulnerability
Sploitctl
⭐
105
Fetch, install and search exploit archives from exploit sites.
Exploit Unknown Gradually
⭐
104
CVPR 2018 Exploit the Unknown Gradually: One-Shot Video-Based Person Re-Identification by Stepwise Learning
Fakepip
⭐
103
Pip install exploit package
Acsploit
⭐
103
A tool for generating worst-case inputs to commonly used algorithms
Apache Superset Remote Code Execution Poc Cve 2018 8021
⭐
102
CVE-2018-8021 Proof-Of-Concept and Exploit
Stm32f1 Picopwner
⭐
98
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 on STM32F1 chips
Cve 2021 22205
⭐
98
GitLab CE/EE Preauth RCE using ExifTool
Bughunter
⭐
97
Tools for Bug Hunting
Fuzzbunch
⭐
97
Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script
Houndsploit
⭐
97
An advanced graphical search engine for Exploit-DB
Springcore 0day En
⭐
96
Everything I needed to understand what was going on with "Spring4Shell" - translated source materials, exploit, links to demo apps, and more.
Exploiting
⭐
95
Exploiting challenges in Linux and Windows
Ubuntu Apport Exploitation
⭐
94
This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter
Sap_gw_rce_exploit
⭐
94
SAP Gateway RCE exploits
Seashell
⭐
94
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Related Searches
Python Script (17,074)
Python Docker (14,113)
Python Machine Learning (14,099)
Python Network (11,495)
Python Testing (9,479)
Python Artificial Intelligence (8,580)
Python Amazon Web Services (8,117)
Python Server (7,793)
Python Search (5,901)
Python Shell (5,055)
201-252 of 252 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.