There are 149 repositories under exploitation topic.
Automatic SQL injection and database takeover tool
A collection of hacking tools, resources and references to practice ethical hacking.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Automated All-in-One OS Command Injection Exploitation Tool.
Automated Mass Exploiter
Automation for internal Windows Penetrationtest / AD-Security
Automatic SSRF fuzzer and exploitation tool
File upload vulnerability scanner and exploitation tool.
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
Cybersecurity oriented awesome list
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Offensive Software Exploitation Course
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
The Offensive Manual Web Application Penetration Testing Framework.
iOS/macOS/Linux Remote Administration Tool
Awesome tools to exploit Windows !
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security.
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Advanced dork Search & Mass Exploit Scanner
AndroRAT | Remote Administrator Tool for Android OS Hacking
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Awesome Pentest Tools Collection
An XSS exploitation command-line interface and payload generator.
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
🔐 Run frida-server on boot with Magisk, always up-to-date
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.