Exploitation Tools

997 tools
nodepass
nodepass
Open Source Exploitation Post-Exploitation

A secure, efficient TCP/UDP tunneling solution that delivers fast, reliable access across network restrictions using pre-established TCP/QUI…

NoSQLMap
NoSQLMap
Open Source Exploitation Web Application

Automated NoSQL injection and database exploitation tool. Targets MongoDB, CouchDB, Redis, and Cassandra for injection attacks and retrieves…

NoSQLMap
NoSQLMap
Open Source Exploitation Scanning & Enumeration

Automated NoSQL database enumeration and web application exploitation tool.

NovaLdr
NovaLdr
Open Source Exploitation

Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)

nox-framework
nox-framework
Free Exploitation Reconnaissance

High-performance OSINT/CTI framework for automated identity pivoting and risk analysis across 120+ sources.

nPassword
nPassword
Open Source Exploitation Post-Exploitation

A Windows AD Password Manager for ATTACKER(Redteamer/Pentester).

NThread
NThread
Open Source Exploitation Reverse Engineering

Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hooks.

ntlm_theft
ntlm_theft
Open Source Exploitation

Creates malicious files (LNK, SCF, PDF, DOCX, etc.) that force a Windows system to authenticate to an attacker's server when the file is acc…

NTLMPasswordChanger
NTLMPasswordChanger
Free Exploitation

PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.

NTLMRecon
NTLMRecon
Open Source Exploitation Reconnaissance

Enumerate information from NTLM authentication enabled web endpoints 🔎

NTLMRecon
NTLMRecon
Open Source Exploitation Reconnaissance

A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.

NTRGhidra
NTRGhidra
Open Source Exploitation Reverse Engineering

A Nintendo DS binary loader for Ghidra

nuclei_poc
nuclei_poc
Open Source Exploitation

Nuclei POC,每2小时更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现。已有41w+POC,其中3.5w+高质…

nuclei-wordfence-cve
nuclei-wordfence-cve
Open Source Exploitation Web Application

70k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒

Nucleimonst3r
Nucleimonst3r
Open Source Exploitation

Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and…

Nullpoint-Stealer
Nullpoint-Stealer
Free Exploitation

Nullpoint Stealer Designed To Steal Everything, And Send To Nullpoint Panel.

NullRAT
NullRAT
Free Exploitation

[POC] Sample Remote Access Trojan with many features

numasec
numasec
Open Source Exploitation Scanning & Enumeration

AI agent for penetration testing. Like Claude Code, but for security. Open source, MCP-native, works with any LLM.

nvdcve
nvdcve
Free Exploitation

__Important__: this repository is now partially redundant with the CVEProject/cvelist project that allows to explore the CVE®/NVD modificati…

nvdlib
nvdlib
Open Source Exploitation

A simple wrapper for the National Vulnerability CVE/CPE API

NyxInvoke
NyxInvoke
Open Source Evasion Exploitation

NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build …

ocean_ctf
ocean_ctf
Open Source Exploitation

CTF平台 支持docker 动态部署题目、分数统计、作弊检测,静态题目,漏洞复现,ctf platform,

octoscan
octoscan
Open Source Exploitation

Octoscan is a static vulnerability scanner for GitHub action workflows.

odoomap
odoomap
Open Source Exploitation Password Attacks

A penetration testing tool for odoo applications.