A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
Jun 1, 2024 - C++
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
A Go-based Exploit Framework
A Ruby micro-framework for writing and running exploits
FireHawk: The Elite Firebase Security Testing Utility
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Simple Powershell Http shell With WEB UI
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
PowerShell executing Rubber Ducky USB Drive for acquiring network credentials
Binary Hooker
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
A helpful Java Deserialization exploit framework.
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
Programable_Security_Assessment_&_Vulnerability_Verification_System (PSAVVY) framework designed for Recon, vulnerability scanning and exploitation. It features a comprehensive list of Python3 Lambda Functions, equipped with terminal commands, allowing for targeted scanning and autonomous exploitation.
Add a description, image, and links to the exploitation-framework topic page so that developers can more easily learn about it.
To associate your repository with the exploitation-framework topic, visit your repo's landing page and select "manage topics."