FireHawk: The Elite Firebase Security Testing Utility
-
Updated
May 19, 2024 - Python
FireHawk: The Elite Firebase Security Testing Utility
SALVADORES EXPLOİT SCANNER
Exploitation is the third stage of Penetration Testing, it means attacking the vulerabilities discovered in the previous steps in order to gain access to the target.
Programable_Security_Assessment_&_Vulnerability_Verification_System (PSAVVY) framework designed for Recon, vulnerability scanning and exploitation. It features a comprehensive list of Python3 Lambda Functions, equipped with terminal commands, allowing for targeted scanning and autonomous exploitation.
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Binary Hooker
Multi-Architecture GDB Enhanced Features for exploit devs & reversers
Siber güvenlik sektörü için çok yönlü amfibi aracı
0x001829-B is exploit tool for web servers & for home ip's
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
A repo to demo RF exploitation using a toy tank as an example
PowerShell executing Rubber Ducky USB Drive for acquiring network credentials
Java exploitation framework
An Xdbg Plugin of the ERC Library.
Redis Exploitation Toolkit - A tool to pwn Redis server before the bad guys do!
The Router Exploitation Framework
format string attack payload generator
Add a description, image, and links to the exploitation-framework topic page so that developers can more easily learn about it.
To associate your repository with the exploitation-framework topic, visit your repo's landing page and select "manage topics."