REBot

REBot

A discord bot for reverse engineers and exploit developers.

Go80wtfpl

11 months ago

pwntools

CTF framework and exploit development library

Python11779other

4 months ago

assemblybsdcapture-the-flag

peda

peda

PEDA - Python Exploit Development Assistance for GDB

Python5869other

4 months ago

pwndbg

pwndbg

Exploit Development and Reverse Engineering with GDB Made Easy

Python7097mit

3 months ago

binary-ninjacapture-the-flagctf

awesome-arm-exploitation

A collection of awesome videos, articles, books and resources about ARM exploita

311

11 months ago

armawesomeawesome-list

gef

gef

GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debuggin

Python6900mit

2 months ago

binary-ninjactfdebugging

Awesome-Fuzzing

A curated list of fuzzing resources ( Books, courses - free and paid, videos, to

5215cc0-1.0

8 months ago

awesomeawesome-listfuzzing

XSRFProbe

XSRFProbe

The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.

Python1063gpl-3.0

7 months ago

auditcrafted-tokenscrawler

beef

The Browser Exploitation Framework Project

JavaScript9629

4 months ago

SILENTTRINITY

SILENTTRINITY

An asynchronous, collaborative post-exploitation agent powered by Python and .NE

Boo2161gpl-3.0

12 months ago

boolangc-sharpdotnet

NoSQLMap

NoSQLMap

Automated NoSQL database enumeration and web application exploitation tool.

Python2831gpl-3.0

4 months ago

bugbountycouchdbdatabases

commix

commix

Automated All-in-One OS Command Injection Exploitation Tool.

Python4489other

4 months ago

bugbountycommand-injectioncommix

tplmap

Server-Side Template Injection and Code Injection Detection and Exploitation Too

Python3696gpl-3.0

7 months ago

PRET

PRET

Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.

Python3941gpl-2.0

4 months ago

routersploit

routersploit

Exploitation Framework for Embedded Devices

Python12216other

30 days ago

bruteforcecredsdictionary-attack

dtd-finder

dtd-finder

List DTDs and generate XXE payloads using those local DTDs.

Kotlin600

9 months ago

dtdhacktoberfestsecurity

legion

legion

Legion is an open source, easy-to-use, super-extensible and semi-automated netwo

Python1014gpl-3.0

4 months ago

StartFlagExploit

StartFlagExploit

A local Android DoS Exploit for API 29 and API 30

Kotlin59gpl-2.0

2 years ago

RecRank

Exploit black-box recommenders for algorithm selection.

Python1bsd-3-clause-clear

4 years ago

ub-canaries

collection of C/C++ programs that try to get compilers to exploit undefined beha

C173mit

6 years ago

Pompem

Pompem

Find exploit tool

Python964gpl-3.0

2 years ago

exploit-databaseexploitspentest-tool

AFE

Android Framework for Exploitation, is a framework for exploiting android based

Python183gpl-3.0

9 years ago

p0wnedShell

PowerShell Runspace Post Exploitation Toolkit

C#1522bsd-3-clause

5 years ago

dref

dref

DNS Rebinding Exploitation Framework

JavaScript480

4 years ago

browser-hackingdns-rebindinghacking

DeadCScroll

DeadCScroll

An assembly tutorial for Game Boy showing how the scroll registers can be exploi

21unlicense

4 years ago

libformatstr

Simplify format string exploitation.

Python337

3 years ago

CitrixHoneypot

Detect and log CVE-2019-19781 scan and exploitation attempts.

HTML114

5 years ago

malSploitBase

Malware exploits

Python531

5 years ago

BinExp

Linux Binary Exploitation

C1289mit

3 years ago

binariesbuffer-overflow-attackbufferoverflow

MBE

MBE

Course materials for Modern Binary Exploitation by RPISEC

C5483bsd-2-clause

3 years ago

ctfexploitationwargame

poisontap

poisontap

Exploits locked/password protected computers over USB, drops persistent WebSocke

JavaScript6252

6 years ago

Empire

Empire is a PowerShell and Python post-exploitation agent.

PowerShell7438bsd-3-clause

5 years ago

ROPgadget

ROPgadget

This tool lets you search your gadgets on your binaries to facilitate your ROP e

Python3814other

last year

binary-exploitationreverse-engineeringrop

CSS-Keylogging

Chrome extension and Express server that exploits keylogging abilities of CSS.

CSS3212

7 years ago

PowerSploit

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell11879other

4 years ago

LiDAR-MOS

LiDAR-MOS

(LMNet) Moving Object Segmentation in 3D LiDAR Data: A Learning-based Approach E

Python569mit

2 years ago

deep-learningdeep-neural-networksdynamic-slam

wysiwyg

wysiwyg

WYSIWYG: Exploiting Visibility for 3D Object Detection, CVPR 2020 (Oral)

Python112bsd-3-clause

4 years ago