Skip to content
View Macmod's full-sized avatar
🤖
🤖

Block or report Macmod

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

Exploitation

58 repositories

A Python Framework For NoSQL Scanning and Exploitation

Python 602 144 Updated Dec 6, 2024

Exploitation Framework for Embedded Devices

Python 13,023 2,388 Updated Mar 2, 2026

CTF framework and exploit development library

Python 13,302 1,820 Updated Mar 5, 2026

The Browser Exploitation Framework Project

JavaScript 10,760 2,340 Updated Mar 9, 2026

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

Java 8,790 1,853 Updated Dec 4, 2025

A repository for learning various heap exploitation techniques.

C 8,465 1,251 Updated Jan 15, 2026

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.

JavaScript 6,447 986 Updated Nov 26, 2018

PEDA - Python Exploit Development Assistance for GDB

Python 6,110 828 Updated Jul 29, 2024

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,800 1,092 Updated Jul 29, 2025

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…

Python 4,380 574 Updated Dec 16, 2025

Server-Side Template Injection and Code Injection Detection and Exploitation Tool

Python 4,124 688 Updated Apr 21, 2024

Automated NoSQL database enumeration and web application exploitation tool.

Python 3,244 625 Updated Feb 20, 2026

JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool

Python 2,515 641 Updated Jan 21, 2020

The best tool for finding one gadget RCE in libc.so.6

Ruby 2,301 148 Updated Mar 5, 2026

Build a database of libc offsets to simplify exploitation

Shell 1,854 197 Updated Oct 23, 2024

An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction

Python 1,117 129 Updated Dec 2, 2021

Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge…

Python 1,599 265 Updated Jun 19, 2021

attacking RSA via lattice reductions (LLL)

TeX 831 134 Updated Apr 11, 2021

macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…

Python 2,301 418 Updated Aug 15, 2024

kernel privilege escalation enumeration and exploitation framework

Python 701 131 Updated Aug 2, 2018

A curated list of amazingly awesome Burp Extensions

3,374 640 Updated Feb 17, 2026

Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper us…

Python 2,100 221 Updated Feb 28, 2025

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 75,935 16,742 Updated Mar 9, 2026

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Python 42,604 4,482 Updated Mar 8, 2026

A list of interesting payloads, tips and tricks for bug bounty hunters.

6,390 1,613 Updated Sep 14, 2023

A collection of links related to Linux kernel security and exploitation

6,374 1,049 Updated Mar 7, 2026

syzkaller is an unsupervised coverage-guided kernel fuzzer

Go 6,092 1,379 Updated Mar 10, 2026

Ladon大型内网渗透扫描器,PowerShell、Cobalt Strike插件、内存加载、无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、漏洞利用、密码读取以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描等。网络资产探测32种协议(ICMP\NBT\DNS\MAC\SMB\WMI\SSH\HTTP\HTTPS\Exc…

C# 5,269 896 Updated Mar 24, 2025

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

6,528 1,319 Updated Jan 18, 2026

Monitor linux processes without root permissions

Go 5,913 566 Updated Mar 1, 2026