There are 40 repositories under exploitation-framework topic.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.
Metasploit Cheat Sheet 💣
Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.
A Go-based Exploit Framework
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Responsive Command and Control System
Very simple script(s) to hasten binary exploit creation
extensible exploitation framework shipped on a modular multi-tasking architecture
A Ruby micro-framework for writing and running exploits
Waymap is a fast and optimized web vulnerability scanner built for penetration testers. It helps in identifying vulnerabilities by testing against various payloads.
Sifter - All purpose penetration testing op-center
Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
Exploit toolkit
Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to obfuscate your PowerShell penetration testing code, malware, or any other sensitive script.
A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Windows Exploitation.
Generate FUD Droppers that are undetectable by popular AV's
Open-source Exploiting Framework