There are 96 repositories under exploitation topic.
Automatic SQL injection and database takeover tool
A collection of hacking tools, resources and references to practice ethical hacking.
Automated Mass Exploiter
Automated All-in-One OS Command Injection Exploitation Tool.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Automation for internal Windows Penetrationtest / AD-Security
File upload vulnerability scanner and exploitation tool.
Automatic SSRF fuzzer and exploitation tool
HackSys Extreme Vulnerable Windows Driver
The Offensive Manual Web Application Penetration Testing Framework.
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
iOS/macOS/Linux Remote Administration Tool
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Awesome tools to exploit Windows !
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Advanced dork Search & Mass Exploit Scanner
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Offensive Software Exploitation Course