|
Python |
2 |
LFI Exploitation tool |
Dec 12, 2022 |
|
None |
7 |
Drupal enumeration & exploitation tool |
Aug 10, 2022 |
|
Python |
7 |
A Upnp exploitation tool. |
Apr 26, 2021 |
|
None |
4 |
A Upnp exploitation tool. |
Oct 15, 2022 |
|
Python |
652 |
SQL Injection Exploitation Tool |
Apr 21, 2023 |
|
None |
2 |
Java Message Exploitation Tool |
Feb 12, 2022 |
|
Python |
185 |
[unmaintained] Post-exploitation tool |
Jan 19, 2024 |
|
Python |
318 |
Ethereum recon and exploitation tool. |
Apr 24, 2023 |
|
C |
3 |
Blumentals Surfblocker password exploitation tool. |
May 07, 2022 |
|
Python |
2 |
Local File Inclusion Exploitation Tool |
Oct 03, 2018 |
|
Python |
575 |
Local file inclusion exploitation tool |
May 11, 2023 |
|
Python |
1944 |
Automatic SSRF fuzzer and exploitation tool |
Aug 15, 2022 |
|
Python |
16 |
LFI (Local File Inclusion) Exploitation Tool |
Feb 06, 2023 |
|
JavaScript |
33 |
Proof-of-concept CORS exploitation tool. |
Nov 24, 2021 |
|
Python |
265 |
Chrome Keylogger Extension | Post Exploitation Tool |
Oct 10, 2022 |
|
Go |
4 |
Amateras - DHCP Starvation attack exploitation tool |
Mar 28, 2023 |
|
Python |
125 |
unix SSH post-exploitation 1337 tool |
Feb 17, 2023 |
|
Python |
3 |
Salesforce Lightning recon and exploitation tool |
Apr 15, 2023 |
|
None |
2 |
Automatic SSRF fuzzer and exploitation tool |
Feb 12, 2022 |
|
Python |
25 |
Huawei DG8045 & HG633 Devices Exploitation Tool |
Mar 31, 2023 |
|
Python |
4 |
Embedded device identification and exploitation tool kit |
Mar 23, 2017 |
|
None |
3 |
File upload vulnerability scanner and exploitation tool. |
May 11, 2022 |
|
None |
3 |
File upload vulnerability scanner and exploitation tool. |
May 02, 2022 |
|
Python |
27 |
Local file inclusion discovery and exploitation tool |
Aug 18, 2022 |
|
Python |
2508 |
File upload vulnerability scanner and exploitation tool. |
May 07, 2023 |
|
Python |
23 |
Universal stack-based buffer overfow exploitation tool |
May 16, 2023 |
|
Python |
2 |
File upload vulnerability scanner and exploitation tool. |
Aug 27, 2022 |
|
Perl |
3 |
Exploitation tool for [Slider Revolution Shell Upload] |
Jun 02, 2023 |
|
C# |
2 |
Yet another MS SQL Server exploitation tool |
Dec 27, 2023 |
|
Shell |
3 |
OpenPwn is an open-source iDevice Exploitation Tool |
Jan 07, 2023 |
|
Python |
20 |
Exploitation Tool For Windows Using Batch and Powershell |
Feb 07, 2023 |
|
Perl |
37 |
cisco-torch : mass scanning, fingerprinting, and exploitation tool |
Oct 03, 2022 |
|
Ruby |
94 |
Blind SQL injection exploitation tool written in ruby. |
Apr 01, 2023 |
|
Rust |
17 |
Kubernetes Configuration Tool |
Mar 30, 2023 |
|
Dockerfile |
43 |
Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation. |
Apr 17, 2023 |
|
Python |
6 |
tool to automate exploitation of android degubg bridge vulnerability |
Feb 12, 2022 |
|
Python |
8 |
C2X-HTTP - C2/Post-Exploitation Tool on HTTP(S) |
Jul 22, 2022 |
|
Python |
11 |
C2X - C2/Post-Exploitation Tool on (Raw Socket Traffic) |
Jun 20, 2022 |
|
Python |
2 |
Automated NoSQL database enumeration and web application exploitation tool. |
Dec 24, 2019 |
|
Python |
7 |
Automated All-in-One OS Command Injection Exploitation Tool |
Aug 16, 2022 |
|
Python |
2186 |
Automated NoSQL database enumeration and web application exploitation tool. |
Oct 18, 2022 |
|
Python |
3502 |
Automated All-in-One OS Command Injection Exploitation Tool. |
Oct 20, 2022 |
|
C++ |
2 |
Post-exploitation tool for hiding processes from monitoring applications |
Oct 28, 2022 |
|
Python |
3 |
A tool to assist, debug, and visualise heap exploitation. |
Apr 30, 2019 |
|
None |
2 |
Automated NoSQL database enumeration and web application exploitation tool. |
Jun 29, 2021 |
|
None |
2 |
Automated All-in-One OS Command Injection Exploitation Tool |
May 09, 2021 |
|
C# |
11 |
A post-exploitation tool to decrypt SolarPutty's sessions files |
Mar 04, 2023 |
|
C++ |
2 |
Post-exploitation tool for hiding processes from monitoring applications |
Jun 29, 2019 |
|
Python |
581 |
An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer |
Oct 20, 2023 |
|
None |
2 |
Post-exploitation tool for hiding processes from monitoring applications |
Oct 21, 2023 |