Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation security tools
exploitation
x
security-tools
x
20 search results found
Traitor
⭐
6,329
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Awesome Hacker Search Engines
⭐
6,307
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Cve
⭐
5,806
Gather and update all available and newest CVEs with their PoC.
Linux Exploit Suggester
⭐
5,139
Linux privilege escalation auditing tool
Autosploit
⭐
4,858
Automated Mass Exploiter
Ladon
⭐
4,564
Ladon大型内网渗透工具,可PowerShell模块化、可CS插件化、可内存加载,无文件扫描。含端 12.2内置262个功能,网络资产探测模块32个通过多种协议(ICMP\NBT\DNS\MAC\SM
Vulmap
⭐
2,935
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能
Silenttrinity
⭐
2,087
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Vulnx
⭐
1,763
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.
Xattacker
⭐
1,486
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Ladongo
⭐
1,423
Ladon for Kali 全平台开源内网渗透扫描器,Windows/Linux/Mac/路由器内网渗透,使用它可轻松一键批量探
A Red Teamer Diaries
⭐
1,294
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Goby
⭐
1,081
Attack surface mapping
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Deimosc2
⭐
926
DeimosC2 is a Golang command and control framework for post-exploitation.
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Cloudpeler
⭐
841
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.
Pompem
⭐
794
Find exploit tool
Autopwn Suite
⭐
636
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
Fireelf
⭐
620
fireELF - Fileless Linux Malware Framework
Ronin
⭐
600
Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositories.
Mxtract
⭐
573
mXtract - Memory Extractor & Analyzer
Jok3r
⭐
564
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Kubehound
⭐
552
Kubernetes Attack Graph
Shodansploit
⭐
437
🔎 shodansploit > v1.3.0
Awesome Bbht
⭐
390
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Iot Pt
⭐
389
A Virtual environment for Pentesting IoT Devices
East
⭐
293
Exploits and Security Tools Framework 2.0.1
Fdsploit
⭐
257
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Rmiscout
⭐
254
RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
Pown
⭐
234
Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.
Fingerprinter
⭐
232
CMS/LMS/Library etc Versions Fingerprinter
Linux Soft Exploit Suggester
⭐
204
Search Exploitable Software on Linux
Handbook
⭐
196
A living document for penetration testing and offensive security.
Inthewilddb
⭐
183
Hourly updated database of exploit and exploitation reports
Jiraffe
⭐
178
One stop place for exploiting Jira instances in your proximity
Vmass
⭐
148
vMass Bot 🪝 Vulnerability Scanner & Auto Exploiter Tool Written in Perl.
Scanner And Patcher
⭐
145
A Web Vulnerability Scanner and Patcher
Pwn Pulse
⭐
131
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Find Gh Poc
⭐
117
Find CVE PoCs on GitHub
Shonydanza
⭐
110
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Spellbook
⭐
96
Framework for rapid development of offensive security tools
Seeyon Exploit
⭐
84
致远OA漏洞检测
Log4j
⭐
74
Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
Pentol
⭐
61
PENTOL - Pentester Toolkit for Fiddler2
Ronin Exploits
⭐
59
A Ruby micro-framework for writing and running exploits
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Venera
⭐
55
A modular exploitation framework extensible with Lua
Containers
⭐
53
Automated privilege escalation of the world's most popular Docker images.
Cve 2021 3129
⭐
48
Laravel RCE (CVE-2021-3129)
Xsmtp
⭐
46
xSMTP 🦟 Lightning fast, multithreaded smtp scanner targeting open-relay and unsecured servers in multiple network ranges.
Cve 2022 42889 Text4shell
⭐
45
Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.
Ekolabs
⭐
40
EKOLABS esta dedicada para investigadores independientes y para la comunidad del Software Libre. Vamos a proveer de stands completos con monitor, alimentacion de energia y acceso a internet por cable, y vos vas a traer tu maquina para mostrar tu trabajo y responder preguntas de los participantes de Ekoparty Security Conference
Xattacker
⭐
39
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Constole
⭐
35
Scan for and exploit Consul agents
Brutus
⭐
30
Botnet targeting Windows machines written entirely in Python & open source security project.
Shadowbroker Smb Scanner
⭐
24
shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION
Labsecurity
⭐
21
Labsecurity is a tool that bundles ethical hacking python scripts into a single tool with cli interface.
Fenix Vm
⭐
19
Backend logic implementation for Vulnerability Management System
Ggtfobins
⭐
17
Get GTFOBins info about a given exploit from the command line
Teensy3.2 Projects
⭐
16
Teensy 3.2 Projects - Teensy with CMD Command Execution Attack Example 💣
Ctf Party
⭐
10
🎏 A library to enhance and speed up script/exploit writing for CTF players
Spring Break_cve 2017 8046
⭐
10
This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).
Kaliladon
⭐
10
Ladon for Linux (Kali), Large Network Penetration Scanner, vulnerability / exploit / detection / MS17010 / password
Tbms
⭐
9
Tor-Browser Sandbox for macOS - security tool to reduce tor-browser access to macOS system
Springbreakvulnerableapp
⭐
9
WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk!
Hunterseye
⭐
9
HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains. The primary goal is to streamline and expedite the process of monitoring newly registered subdomains and SSL certificates related to specified target domains.
Mobile Heavy Artillery
⭐
8
🔥Ready, Aim, Fire.🔥
Gitlab_rce_cve 2022 2884
⭐
7
Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.
Pghostile
⭐
7
Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can be used to identify security issues in PostgreSQL extensions, to test system hardening and for security research in general.
Secrep
⭐
7
SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads
Ill
⭐
5
🐧 I Love Linux (ILL) is a C tool developed to fast search for kernel vulnerabilities and suggest to the user
Pickleassem
⭐
5
A simple pickle assembler to make handcrafting pickle bytecode easier.
Snikshell
⭐
5
Powershell reverse shell, written in python3.9
Related Searches
Python Exploitation (1,621)
Exploitation Cve (771)
Vulnerabilities Exploitation (629)
Python Security Tools (592)
C Exploitation (545)
Exploitation Penetration Testing (353)
1-20 of 20 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.