Exploitation Tools

997 tools
JarPlant
JarPlant
Open Source Exploitation

Spike JAR files with malicious implants.

java-chains
java-chains
Free Exploitation

Java Vulnerability Exploitation Platform

JNDI-Injection-Exploit-Plus
JNDI-Injection-Exploit-Plus
Open Source Exploitation

80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background service…

JoJoLoader
JoJoLoader
Free Exploitation

助力红队成员一键生成免杀木马,使用rust实现 | Help Redteam members generate Evasive Anti-virus software Trojan

joomscan
joomscan
Open Source Exploitation Web Application

OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/

js-cookie-monitor-debugger-hook
js-cookie-monitor-debugger-hook
Open Source Exploitation Reverse Engineering

js cookie逆向利器:js cookie变动监控可视化工具 & js cookie hook打条件断点

jsql-injection
jsql-injection
Open Source Kali Exploitation

jSQL Injection is a Java application for automatic SQL database injection.

jsscm
jsscm
Open Source Exploitation Web Application

JSSCM detects expired domains for Stored XSS exploitation during browsing.

juumla
juumla
Open Source Exploitation

🦁 Python project to identify and scan for vulnerabilities related to the Joomla CMS project. It scans for common misconfigurations and publi…

k8spider
k8spider
Open Source Exploitation Reconnaissance

Powerful+Fast+Low Privilege Kubernetes discovery tools

K8tools
K8tools
Open Source Exploitation Password Attacks

K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Ex…

Kali-Linux
Kali-Linux
Open Source Kali Exploitation Forensics

A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, methodol…

Kali-Linux-Ebooks
Kali-Linux-Ebooks
Free Exploitation

Top 20 Kali Linux Related E-books (Free Download)

kartlanpwn
kartlanpwn
Free Exploitation

Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability

kcwarden
kcwarden
Open Source Exploitation

Automatically audit your Keycloak configuration for security issues

kepler
kepler
Free Exploitation

NIST-based CVE lookup store and API powered by Rust.

Keres
Keres
Open Source Exploitation

Persistent Powershell backdoor tool {😈}

kernel-exploits
kernel-exploits
Free Exploitation Post-Exploitation

My proof-of-concept exploits for the Linux kernel

Keylogger
Keylogger
Free Exploitation

Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, Mou…

killshot
killshot
Free Exploitation Reconnaissance

A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner

kitsec-core
kitsec-core
Open Source Exploitation Reconnaissance

KittyLoader
KittyLoader
Free Evasion Exploitation

KittyLoader is a highly evasive loader written in C / Assembly

kong-loader
kong-loader
Open Source Evasion Exploitation

Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible in m…

KoviD
KoviD
Free Exploitation

Rootkits are typically closed-source threats that operate in shadows, making them difficult to understand and defend against. KoviD exists t…