Exploitation Tools

997 tools
cyber_threat_intelligence
cyber_threat_intelligence
Free Exploitation

Cyber Threat Intelligence Data, Indicators, and Analysis

Cyber-Claude
Cyber-Claude
Open Source Exploitation

An AI-powered cybersecurity agent inspired by Claude Agent SDK, designed exclusively for defensive security operations.

cyberclopaedia
cyberclopaedia
Open Source Exploitation Reconnaissance

This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is acce…

CyberEdge
CyberEdge
Free Exploitation

这将自动: 1. 启动MySQL Docker容器 2. 初始化数据库schema 3. 启动后端API服务 (端口31337) 4. 启动前端开发服务器 (端口8080)

cyberowl
cyberowl
Open Source Exploitation

Aggregates security advisories from 10 international CERTs daily and provides an AI skill that cross-references alerts against your project'…

cybersecurity_hack
cybersecurity_hack
Open Source Kali Exploitation

Social Media, Website, Crypto Hacking 🔥 Hacker, Cyber, Cybersecurity. Instagram, TikTok, YouTube, Telegram, Snapchat Hacking. Cryptocurrency…

cybersecurity-career-roadmap
cybersecurity-career-roadmap
Open Source Exploitation

Complete career paths for SOC, Pentesting, Blue Team, Red Team & more

CyberSecurityRSS
CyberSecurityRSS
Free Exploitation

CyberSecurityRSS: A collection of cybersecurity rss to make you better!

CyberStrike
CyberStrike
Open Source Exploitation Web Application

AI-powered offensive security agent with 7,300+ actionable security skills. Autonomous pentesting powered by MITRE ATT&CK (2,000+ Atomic tes…

D3m0n1z3dShell
D3m0n1z3dShell
Open Source Exploitation Post-Exploitation

Demonized Shell is an Advanced Tool for persistence in linux.

dalfox
dalfox
Open Source Exploitation Web Application

🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.

Damn-Vulnerable-GraphQL-Application
Damn-Vulnerable-GraphQL-Application
Open Source Exploitation Web Application

Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising…

dark-kill
dark-kill
Free Exploitation

A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callba…

DarkGPT-Lite
DarkGPT-Lite
Open Source Exploitation Reverse Engineering

DarkGPT Lite is a specialized CLI tool providing unrestricted conversations with AI for cybersecurity research purposes

dart
dart
Open Source Exploitation

DART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolate…

dataBrawl
dataBrawl
Free Evasion Exploitation

1. 本地/分离加载 2. ollvm混淆编译/gcc编译 3. IAT obfuscate 4. Anti-VM 5. Anti-Sandbox(API Hammering,自定义sleep) 6. Anti-Debug 7. 内存加密 8. add resource/sign

DDoS-Ripper
DDoS-Ripper
Open Source Exploitation Web Application

DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Interne…

DDOS-RootSec
DDOS-RootSec
Free Exploitation

Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advan…

deck-of-many-prompts
deck-of-many-prompts
Free Exploitation

Manual Prompt Injection / Red Teaming Tool

DEDSEC_PTZ_EXPLOIT
DEDSEC_PTZ_EXPLOIT
Open Source Exploitation

This is a exploit with the capability to control ip camera movement even without a username and password.

deepce
deepce
Open Source Exploitation Post-Exploitation

Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)

DefaultCreds-cheat-sheet
DefaultCreds-cheat-sheet
Open Source Exploitation

One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️

DEFCON-33
DEFCON-33
Free Exploitation Reverse Engineering

Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers

defi-threat
defi-threat
Open Source Exploitation

a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance