Exploitation Tools

997 tools
ducky-virus
ducky-virus
Open Source Kali Exploitation

Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+

Duolingo-Hacks
Duolingo-Hacks
Open Source Exploitation

Duolingo Hacks One of the best Duolingo hacks. Discord Support Server: https://discord.gg/abqMVbDanB…

Duolingo-Unlimited-Hearts
Duolingo-Unlimited-Hearts
Open Source Exploitation

Grants Duolingo Max and other paid features for free + more

DVWA
DVWA
Open Source Exploitation

Damn Vulnerable Web Application (DVWA)

EACBypass-CR3ReadyDrv
EACBypass-CR3ReadyDrv
Free Exploitation

This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.

EasY_HaCk
EasY_HaCk
Open Source Exploitation Scanning & Enumeration

1. Hack the World using Termux this tool is developed by sabri.zaki for penetration testing using 2. metasploit-framework 3. sqlmap 4. nmap …

EchoStrike
EchoStrike
Open Source Exploitation

Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operations.

eCPPTv3-Notes
eCPPTv3-Notes
Open Source Exploitation Post-Exploitation

INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes

Egyscan
Egyscan
Open Source Exploitation Web Application

Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malici…

ejpt-roadmap
ejpt-roadmap
Free Exploitation

This repository contains a roadmap for preparing for the EJPTv2 exam.

emp3r0r
emp3r0r
Open Source Exploitation Post-Exploitation

Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport

empirectf
empirectf
Free Exploitation Reverse Engineering

EmpireCTF – write-ups, capture the flag, cybersecurity

emploleaks
emploleaks
Free Exploitation Reconnaissance

An OSINT tool that helps detect members of a company with leaked credentials

Eneio64-Driver-Exploits
Eneio64-Driver-Exploits
Free Exploitation

A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W

EnhancedBurpGPT
EnhancedBurpGPT
Open Source Exploitation Scanning & Enumeration

Enhanced BurpGPT 是一个强大的 Burp Suite 插件。通过分析指定的 HTTP 请求和响应,帮助安全测试人员更快速地发现潜在的安全漏洞。

ENScan_GO
ENScan_GO
Open Source Exploitation

一款基于各大企业信息API的工具,解决在遇到的各种针对国内企业信息收集难题。一键收集控股公司ICP备案、APP、小程序、微信公众号等信息聚合导出。支持MCP接入

Ensemble
Ensemble
Open Source Exploitation Web Application

A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting to s…

EPI
EPI
Free Exploitation

Threadless Process Injection through entry point hijacking

epic
epic
Free Evasion Exploitation

PIC shellcode (C/C++) development toolkit designed for malware developers.

ERC.Xdbg
ERC.Xdbg
Open Source Exploitation

An Xdbg Plugin of the ERC Library.

Erebus
Erebus
Open Source Exploitation

Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specificall…

ESP32-Sour-Apple
ESP32-Sour-Apple
Open Source Exploitation Wireless

Crashes iOS 17 Devices using really any device

Ethical_Hacking_and_Penetration_Testing
Ethical_Hacking_and_Penetration_Testing
Open Source Exploitation

This repository is all about tips on ethical hacking and penetration testing!

Evil-WinRM
Evil-WinRM
Open Source Kali Exploitation Post-Exploitation

Full-featured WinRM shell for hacking and penetration testing. Supports pass-the-hash, file upload/download, in-memory script loading, and P…