Exploitation Tools

997 tools
MY-CRTP-Notes
MY-CRTP-Notes
Open Source Exploitation Post-Exploitation

This repository contains my preparation notes for CRTP and Red Teaming, focused on Active Directory attacks and defenses.

n8n-CVE-2025-68613-exploit
n8n-CVE-2025-68613-exploit
Free Exploitation

CVE-2025-68613: n8n RCE vulnerability exploit and documentation

n8n-CyberSecurity-Workflows
n8n-CyberSecurity-Workflows
Open Source Exploitation

Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.

nac_bypass
nac_bypass
Open Source Exploitation

Script collection to bypass Network Access Control (NAC, 802.1x)

NacosExploit
NacosExploit
Free Exploitation

NacosExploit 一款 Nacos 综合漏洞利用工具 …

nacs
nacs
Free Exploitation

事件驱动的渗透测试扫描器 Event-driven pentest scanner

NativePayloads
NativePayloads
Free Evasion Exploitation

All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming

Nday-Exploit-Plan
Nday-Exploit-Plan
Open Source Exploitation

https://github.com/OracleNep/Nday-Exploit-Plan/assets/41804496/16a5cdd2-cc2c-4808-95ac-1f0cab09b35f

NEBULA
NEBULA
Open Source Exploitation

Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques

Neo4LDAP
Neo4LDAP
Open Source Exploitation Post-Exploitation

Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis …

NetExec
NetExec
Open Source Exploitation Post-Exploitation

🚩 This is the open source repository of NetExec maintained by a community of passionate people

Netexec (nxc)
Netexec (nxc)
Open Source Kali Exploitation Post-Exploitation

The maintained fork and successor to CrackMapExec. Network service exploitation Swiss army knife for Active Directory pentesting. Supports S…

NetSecurity
NetSecurity
Free Exploitation Web Application

网络安全训练营全部资料,包括 Web 安全、网络安全、信息安全、系统防护、攻防渗透、云安全

Nettacker
Nettacker
Open Source Exploitation Reconnaissance

Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management

Next.js-RSC-RCE-Scanner-CVE-2025-66478
Next.js-RSC-RCE-Scanner-CVE-2025-66478
Free Exploitation

A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerabil…

Nginx-Lua-Anti-DDoS
Nginx-Lua-Anti-DDoS
Open Source Exploitation

A Anti-DDoS script to protect Nginx web servers using Lua with a HTML Javascript based authentication puzzle inspired by Cloudflare I am und…

Nidhogg
Nidhogg
Open Source Exploitation

Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.

Nimbo-C2
Nimbo-C2
Open Source Exploitation Post-Exploitation

Nimbo-C2 is yet another (simple and lightweight) C2 framework

Nishang
Nishang
Open Source Kali Exploitation Post-Exploitation

Framework and collection of PowerShell scripts and payloads for offensive security and post-exploitation. Includes reverse shells, privilege…

nishang
nishang
Free Kali Exploitation

Nishang - Offensive PowerShell for red team, penetration testing and offensive security.

NIST-to-Tech
NIST-to-Tech
Open Source Exploitation

An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)

Nitro-Ransomware
Nitro-Ransomware
Free Exploitation

Discord nitro gift subscription ransomware

NmiCallbackBlocker
NmiCallbackBlocker
Free Exploitation

Kernel Level NMI Callback Blocker

nocom-explanation
nocom-explanation
Free Exploitation

block game military grade radar