Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python exploitation
exploitation
x
python
x
252 search results found
Sqlmap
⭐
29,628
Automatic SQL injection and database takeover tool
Routersploit
⭐
11,818
Exploitation Framework for Embedded Devices
Pwntools
⭐
11,336
CTF framework and exploit development library
Fsociety
⭐
10,082
fsociety Hacking Tools Pack – A Penetration Testing Framework
Byob
⭐
8,681
An open-source post-exploitation framework for students, researchers and developers.
Pwndbg
⭐
6,337
Exploit Development and Reverse Engineering with GDB Made Easy
Gef
⭐
6,203
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Peda
⭐
5,399
PEDA - Python Exploit Development Assistance for GDB
Defaultcreds Cheat Sheet
⭐
5,023
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Autosploit
⭐
4,858
Automated Mass Exploiter
Ptf
⭐
4,854
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
Jwt_tool
⭐
4,639
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
Commix
⭐
4,328
Automated All-in-One OS Command Injection Exploitation Tool.
Phonesploit Pro
⭐
3,899
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Pacu
⭐
3,879
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Wesng
⭐
3,789
Windows Exploit Suggester - Next Generation
Tplmap
⭐
3,537
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
Qark
⭐
3,083
Tool to look for several security related Android application vulnerabilities
Xunfeng
⭐
2,946
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Vulmap
⭐
2,935
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能
Collisions
⭐
2,661
Hash collisions and exploitations
Exphub
⭐
2,458
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的
Androrat
⭐
2,423
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Ghost
⭐
2,400
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Nightmare
⭐
2,313
Pentest Wiki
⭐
2,307
PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
Ssrfmap
⭐
2,306
Automatic SSRF fuzzer and exploitation tool
Gopherus
⭐
2,228
This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
Computer Science Resources
⭐
2,227
A list of resources in different fields of Computer Science
Silenttrinity
⭐
2,087
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Exploitation Course
⭐
2,055
Offensive Software Exploitation Course
Ms17 010
⭐
2,013
MS17-010
Fuxploider
⭐
1,702
File upload vulnerability scanner and exploitation tool.
Pwn_jenkins
⭐
1,693
Notes about attacking Jenkins servers
Hacktronian
⭐
1,664
Tools for Pentesting
100 Redteam Projects
⭐
1,661
Projects for security students
Poshc2
⭐
1,645
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Getsploit
⭐
1,589
Command line utility for searching and downloading exploits
Eqgrp_lost_in_translation
⭐
1,574
Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
Mona
⭐
1,571
Corelan Repository for mona.py
Exploits
⭐
1,484
Miscellaneous exploit code
Jexboss
⭐
1,470
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
V3n0m Scanner
⭐
1,342
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Awesome Industrial Control System Security
⭐
1,315
A curated list of resources related to Industrial Control System (ICS) security.
Pentest Notes
⭐
1,202
Toxssin
⭐
1,105
An XSS exploitation command-line interface and payload generator.
Hashpump
⭐
1,080
A tool to exploit the hash length extension attack in various hashing algorithms
Ps4 Exploit Host
⭐
1,067
Easy Exploit Hosting
Ambiguous Png Packer
⭐
1,010
Craft PNG files that appear completely different in Apple software [NOW PATCHED]
Ds_store_exp
⭐
993
A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.
Isf
⭐
978
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
Leviathan
⭐
969
wide range mass audit toolkit
Labs
⭐
939
Vulnerability Labs for security analysis
Linuxprivchecker
⭐
934
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Featherduster
⭐
928
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
How To Exploit A Double Free
⭐
881
How to exploit a double free vulnerability in 2021. 'Use After Free for Dummies'
Vfeed
⭐
830
The Correlated CVE Vulnerability And Threat Intelligence Database API
Cloakquest3r
⭐
818
Uncover the true IP address of websites safeguarded by Cloudflare & Others
Sam The Admin
⭐
818
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Xsser
⭐
814
Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
Shellen
⭐
799
🌸 Interactive shellcoding environment to easily craft shellcodes
Pompem
⭐
794
Find exploit tool
Pocorexp_in_github
⭐
786
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
Jdwp Shellifier
⭐
776
Shellshocker Pocs
⭐
775
Collection of Proof of Concepts and Potential Targets for #ShellShocker
Tactical Exploitation
⭐
768
Modern tactical exploitation toolkit.
Hack Tools
⭐
764
hack tools
Oscp
⭐
749
Collection of things made during my OSCP journey
Ofx
⭐
725
漏洞批量验证框架
Cves
⭐
718
A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.
Like Dbg
⭐
713
Fully dockerized Linux kernel debugging environment
Cve 2023 38831 Winrar Exploit
⭐
705
CVE-2023-38831 winrar exploit generator
Corscanner
⭐
701
Fast CORS misconfiguration vulnerabilities scanner🍻
Arm_now
⭐
701
arm_now is a qemu powered tool that allows instant setup of virtual machines on arm cpu, mips, powerpc, nios2, x86 and more, for reverse, exploit, fuzzing and programming purpose.
Redis Rce
⭐
671
Redis 4.x/5.x RCE
Linux Exploitation Course
⭐
669
A Course on Intermediate Level Linux Exploitation
Phonesploit
⭐
668
A tool for remote ADB exploitation in Python3 for all Machines.
Heap Viewer
⭐
666
IDA Pro plugin to examine the glibc heap, focused on exploit development
Autopwn Suite
⭐
636
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
Nuclei Wordfence Cve
⭐
627
You just found a hidden gem 💎 This repo contains a massive amount (9,000+) of WordPress related Nuclei templates. Updated daily!
Cve 2017 0199
⭐
622
Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
Fireelf
⭐
620
fireELF - Fileless Linux Malware Framework
Chimay Red
⭐
613
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
Clusterd
⭐
609
application server attack toolkit
Rex
⭐
603
Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.
Kernelpop
⭐
594
kernel privilege escalation enumeration and exploitation framework
Liffy
⭐
591
Local file inclusion exploitation tool
Nosql Exploitation Framework
⭐
585
A Python Framework For NoSQL Scanning and Exploitation
Adbsploit
⭐
575
A python based tool for exploiting and managing Android devices via ADB
Puncia
⭐
563
The Panthera(P.)uncia of Cybersecurity - Subdomain & Exploit Hunter powered by AI
Jackit
⭐
554
JackIt - Exploit Code for Mousejack
Pwnxss
⭐
544
PwnXSS: Vulnerability (XSS) scanner exploit
Cmspoc
⭐
530
CMS渗透测试框架-A CMS Exploit Framework
Ctf Tasks
⭐
530
An archive of low-level CTF challenges developed over the years
Pwndra
⭐
526
A collection of pwn/CTF related utilities for Ghidra
Dirty_sock
⭐
510
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Darkarmy
⭐
509
DARKARMY Hacking Tools Pack - A Penetration Testing Framework .
Mec
⭐
508
for mass exploiting
Aclpwn.py
⭐
495
Active Directory ACL exploitation with BloodHound
Cve 2018 10933
⭐
494
Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)
Related Searches
Python Script (17,074)
Python Docker (14,113)
Python Machine Learning (14,099)
Python Network (11,495)
Python Testing (9,479)
Python Artificial Intelligence (8,580)
Python Amazon Web Services (8,117)
Python Server (7,793)
Python Search (5,901)
Python Shell (5,055)
1-100 of 252 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.