Exploitation
A Python Framework For NoSQL Scanning and Exploitation
Exploitation Framework for Embedded Devices
CTF framework and exploit development library
The Browser Exploitation Framework Project
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
A repository for learning various heap exploitation techniques.
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
PEDA - Python Exploit Development Assistance for GDB
Attack and defend active directory using modern post exploitation adversary tradecraft activity
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
Automated NoSQL database enumeration and web application exploitation tool.
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
The best tool for finding one gadget RCE in libc.so.6
Build a database of libc offsets to simplify exploitation
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge…
attacking RSA via lattice reductions (LLL)
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
kernel privilege escalation enumeration and exploitation framework
A curated list of amazingly awesome Burp Extensions
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper us…
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
A list of interesting payloads, tips and tricks for bug bounty hunters.
A collection of links related to Linux kernel security and exploitation
syzkaller is an unsupervised coverage-guided kernel fuzzer
Ladon大型内网渗透扫描器,PowerShell、Cobalt Strike插件、内存加载、无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、漏洞利用、密码读取以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描等。网络资产探测32种协议(ICMP\NBT\DNS\MAC\SMB\WMI\SSH\HTTP\HTTPS\Exc…
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Monitor linux processes without root permissions




