Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined modules, harvest reverse shells, and many more.
☆19Jul 21, 2021Updated 4 years ago
Alternatives and similar repositories for Cannon
Users that are interested in Cannon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 9 months ago
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆105Dec 16, 2025Updated 4 months ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 6 months ago
- Beta release☆185Oct 8, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PoC for CVE-2022-23940☆12May 7, 2025Updated last year
- ☆11Jan 23, 2023Updated 3 years ago
- WordPress version scanner written in Python.☆15Jun 18, 2024Updated last year
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- ☆14Feb 5, 2022Updated 4 years ago
- ☆29May 6, 2025Updated last year
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- https://alvinsmith.gitbook.io/progressive-oscp/☆39Jan 16, 2026Updated 3 months ago
- ☆14Feb 9, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Jul 18, 2018Updated 7 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 4 years ago
- ☆32May 19, 2022Updated 3 years ago
- Don't expect much :) Just expect to learn new things!☆64Mar 11, 2021Updated 5 years ago
- Surgical python tool to assist in LFI discovery☆13Sep 2, 2018Updated 7 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆171Nov 17, 2023Updated 2 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆52Sep 14, 2025Updated 7 months ago
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64May 18, 2021Updated 4 years ago
- ☆32Jun 10, 2020Updated 5 years ago
- ☆69Apr 20, 2022Updated 4 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 5 years ago
- You can crack any zip file and get the password.☆21Nov 5, 2023Updated 2 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 10 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆18Nov 5, 2023Updated 2 years ago
- dmg2img converter, used to flash DMG images on the fly on EtchDroid☆16Aug 17, 2018Updated 7 years ago
- Hackable website for teaching/training purposes. Includes my undergraduate thesis.☆14Mar 7, 2018Updated 8 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- Proof-of-Concept code snippets for a variety of different process injection techniques☆23Feb 2, 2023Updated 3 years ago
- domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once w…☆71Jan 16, 2025Updated last year
- 🐳 VMs are bloat. Dockerise your VAPT environment☆80Apr 19, 2025Updated last year