A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
May 30, 2024 - C++
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
A Go-based Exploit Framework
A Ruby micro-framework for writing and running exploits
FireHawk: The Elite Firebase Security Testing Utility
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Simple Powershell Http shell With WEB UI
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
PowerShell executing Rubber Ducky USB Drive for acquiring network credentials
Binary Hooker
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
A helpful Java Deserialization exploit framework.
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
Programable_Security_Assessment_&_Vulnerability_Verification_System (PSAVVY) framework designed for Recon, vulnerability scanning and exploitation. It features a comprehensive list of Python3 Lambda Functions, equipped with terminal commands, allowing for targeted scanning and autonomous exploitation.
Add a description, image, and links to the exploitation-framework topic page so that developers can more easily learn about it.
To associate your repository with the exploitation-framework topic, visit your repo's landing page and select "manage topics."