FDsploit FDsploit is a File inclusion & Directory Traversal fuzzer, enumeration & exploitation tool. Features The LFI-shell interface provides only the output...
BOtB is a container analysis and exploitation tool designed to be used by pentesters and engineers while also being CI/CD friendly...
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation of targets with the objective to exploit...
PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY...
BOtB (Break out the Box) is a container analysis and exploitation tool designed to be used by pentesters and engineers while also...
CMSeek is an open-source tool that analyzes the regex of websites in order to detect flaws and content management system used like...
Theo aims to be an exploitation framework and a blockchain recon and interaction tool. Features: Automatic smart contract scanning which generates a...
TheFatRat is an easy to use tool which helps in generating backdoors, system exploitation, post exploitation attacks, browser attacks, DLL files, FUD...
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker to escalate their privileges. The main goal...
A bunch of resources related to Linux kernel exploitation. Exploitation techniques 2019: “Leak kernel pointer by exploiting uninitialized uses in Linux kernel”...
Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace. RedGhost Features Payloads Function to...
Pacu is an open source AWS exploitation framework created and maintained by Rhino Security Labs to assist in offensive security testing against...
Beemka shows how vulnerabilities in the Electron Framework could allow an attacker to inject malicious code inside a legitimate application without raising...
QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR...
ISF(Industrial Exploitation Framework) is a exploitation framework based on Python, it’s similar to metasploit framework. ICS Protocol Clients Name Path Description modbus_tcp_client...
zeebsploit is a tool for hacking, searching web information and scanning vulnerabilities on the web. Installation $ apt-get install git python $...
Sophisticated threats are Evolving with much more advanced capabilities and giving more pain for analysis even evade the advanced security software such...
SSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes...
XSRFProbe is an advanced Cross Site Request Forgery (CSRF/XSRF) Audit and Exploitation Toolkit. Equipped with a Powerful Crawling Engine and Numerous Systematic...
SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and services. Once...
Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to...