shellsploit / shellsploit-framework
☆471Updated this week
Related projects: ⓘ
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆344Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆485Updated 2 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆322Updated 7 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- ☆321Updated this week
- ☆414Updated this week
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆174Updated 8 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆328Updated 8 years ago
- ☆136Updated 9 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 4 years ago
- ☆289Updated this week
- peinjector - MITM PE file infector☆598Updated 8 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆354Updated last year
- A tool to help you write binary exploits☆603Updated 5 years ago
- ☆237Updated this week
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Updated 7 years ago
- Teach you a binary exploitation for great good.☆294Updated 5 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆429Updated 6 years ago
- ☆710Updated this week
- ☆134Updated this week
- ☆247Updated this week
- A webshell framework for penetration testers.☆294Updated 5 months ago
- Probably one of the smallest SSL MITM proxies you can make☆181Updated 9 years ago
- Fancy Bear Source Code☆260Updated 7 years ago
- Automated Linux evil maid attack☆418Updated 8 years ago
- ☆226Updated this week
- The first open source vulnerability scanner for firmwares☆193Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆227Updated 8 years ago