Exploitation Tools

997 tools
DeimosC2
DeimosC2
Open Source Exploitation Post-Exploitation

DeimosC2 is a Golang command and control framework for post-exploitation.

delvelin
delvelin
Free Exploitation

Delvelin is a Code Vulnerability Analyzer for Java and Kotlin that supports best practices in security and risk management.

dep-scan
dep-scan
Open Source Exploitation

OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for pro…

devguard
devguard
Free Exploitation Web Application

DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your Vul…

device-activity-tracker
device-activity-tracker
Free Exploitation

A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT ti…

Devil
Devil
Open Source Kali Exploitation

Devil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker ,…

Dexterion
Dexterion
Open Source Exploitation

Diablo
Diablo
Open Source Exploitation Scanning & Enumeration

Diablo ~ Hacking / Pentesting & Reporting

Diamorphine
Diamorphine
Free Exploitation

LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)

dinvk
dinvk
Open Source Exploitation

Dynamically invoke arbitrary code in Rust

dirsearch
dirsearch
Free Exploitation Password Attacks

Discord-Twitch-Bot
Discord-Twitch-Bot
Free Exploitation

・Change prefix to whatever you want in config

DiscordRAT
DiscordRAT
Free Exploitation

Discord Remote Administration Tool fully written in Python3

discover
discover
Open Source Kali Exploitation Reconnaissance

Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creati…

dittobytes
dittobytes
Open Source Evasion Exploitation

Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.

DLLHijackHunter
DLLHijackHunter
Open Source Exploitation Post-Exploitation

Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.

DllShimmer
DllShimmer
Free Exploitation Post-Exploitation

Weaponize DLL hijacking easily. Backdoor any function in any DLL.

DocEx
DocEx
Open Source Exploitation

APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files

dockle
dockle
Open Source Exploitation

Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start

Donut
Donut
Open Source Evasion Exploitation

Generates position-independent shellcode from .NET assemblies, PE files, scripts (VBScript, JScript), and XSL that runs in memory. Used to e…

DorkEye
DorkEye
Free Exploitation Reconnaissance

Automated Google Dorking Tool. Generates and runs advanced search queries for exposed files. It also tests SQLi, Analyzes and extracts metad…

DorkHub
DorkHub
Open Source Exploitation Reconnaissance

DorkHub is the security researcher's companion. It’s a comprehensive repository of Google dorks collected in one place, specifically designe…

DPAPISnoop
DPAPISnoop
Open Source Exploitation

A C# tool to output crackable DPAPI hashes from user MasterKeys

DreamWalkers
DreamWalkers
Free Exploitation

Reflective shellcode loaderwith advanced call stack spoofing and .NET support.