Skip to content

AkaTorich/ExploitWorkbench

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ExploitWorkbench

A unified desktop workbench for exploit development, vulnerability research, and penetration testing on Windows.

ExploitWorkbench

Overview

ExploitWorkbench brings together exploit databases, network reconnaissance, payload generation, and hands-on testing tools into a single native application. Instead of juggling dozens of terminal windows and browser tabs, everything lives in one workspace with a shared target context — set the target once and every module picks it up automatically.

Features

Exploit & Shellcode Database

Browse and search over 47,000 exploits from Exploit-DB and more than 1,000 shellcodes. Filter by platform, category, file type, author, or CVE identifier. Full-text content search is available for deep queries across the entire archive.

CVE Search Engine

Query the MITRE cvelistV5 database locally. Filter by vendor, product, version, CWE, CVSS severity, or keywords. Each result shows full metadata — scores, affected configurations, linked patches, and known exploits.

Code Editor & Execution Engine

Write and run exploits directly inside the workbench. The built-in editor supports syntax highlighting for Python, C/C++, Perl, Ruby, PHP, PowerShell, Bash, and more. Target variables like {{RHOST}}, {{LHOST}}, and {{LPORT}} are substituted at runtime, so a single exploit template works across different engagements without manual edits.

Network Scanner

Integrated Nmap frontend with preset scan profiles — quick discovery, service detection, OS fingerprinting, stealth SYN, full TCP, and UDP. Custom flags are supported for fine-tuned scans. Results appear in real time in the console.

Reverse Shell Handler

Spin up TCP listeners on any local interface and manage multiple concurrent sessions. Send commands, view output, and switch between active shells from a single panel.

Auto-Pwn

Scan a target for open services, then automatically match them against known exploits in the database. Review suggested matches and launch the selected exploit with one click.

Fuzzing

TCP Fuzzer — send templated payloads to a remote service with configurable length ranges and filler characters. The results table tracks connection status and crash indicators for each iteration.

Local Fuzzer — fuzz command-line executables by injecting variable-length arguments. Exit codes and crash events are captured automatically.

Shellcode Generator

Load raw shellcode in binary, hex, escaped, or C-array format and convert between them. Generate ready-to-use loader templates for C and Python. An integrated msfvenom GUI provides access to all Metasploit payloads, encoders, and output formats without leaving the workbench.

Repeater

Send raw TCP requests to any host and port, inspect the response, and iterate — similar to Burp Suite's Repeater. Useful for manual protocol testing and request crafting.

Hex Editor

View and edit binary files byte-by-byte. Search and replace hex patterns for shellcode analysis and binary patching.

Decoder

Encode and decode strings between Base64, Hex, URL encoding, ROT13, and XOR. Swap input and output for quick round-trip conversions.

Utilities Library

A collection of ready-made templates for common offensive tasks: persistence mechanisms (registry keys, scheduled tasks, services, WMI, COM hijacking), privilege escalation helpers (token impersonation, UAC bypass, PPL bypass), and lightweight agents in multiple languages (PowerShell, .NET, VBS, JavaScript, DLL).

Built-in Browser

An embedded Chromium browser for quick access to Exploit-DB, NVD, MITRE, and CTF practice platforms — HackTheBox, TryHackMe, picoCTF, Root Me, OverTheWire, VulnHub, and others.

Project Management

Save and load engagement files that preserve target configuration, editor content, compiled implants, and execution history. Generate HTML reports at the end of an assessment.

Requirements

  • Windows 10 or later
  • .NET Framework 4.8
  • Nmap (optional, for network scanning)
  • Metasploit / msfvenom (optional, for payload generation)
  • Python 3.x (optional, for running Python-based exploits)

Disclaimer

ExploitWorkbench is intended for authorized security testing, research, and educational purposes only. Always obtain proper authorization before testing systems you do not own.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages