Exploitation Tools

997 tools
SpringBoot-Scan
SpringBoot-Scan
Open Source Exploitation

针对SpringBoot的开源渗透框架,以及Spring相关高危漏洞利用工具

SpyAI
SpyAI
Open Source Exploitation

Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's usi…

SQL-101
SQL-101
Open Source Exploitation

Get started with SQL database programming. This beginner's guide provides step-by-step tutorials, practical examples, exercises, and resourc…

SQL-Injection-Payloads
SQL-Injection-Payloads
Free Exploitation Reconnaissance

This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It include…

sql-ultimate-course
sql-ultimate-course
Open Source Exploitation

The most comprehensive SQL guide from a real-world expert! Learn everything from basics to advanced queries, optimizations, and real-world S…

sqli-hunter
sqli-hunter
Free Exploitation Scanning & Enumeration

SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.

sqlifinder
sqlifinder
Free Exploitation Web Application

SQL Injection Vulnerability Scanner made with Python

SQLMap
SQLMap
Open Source Kali Exploitation Web Application

Automatic SQL injection and database takeover tool. Supports detection and exploitation of all major SQL injection types across MySQL, MSSQL…

sqlmap
sqlmap
Free Kali Exploitation Scanning & Enumeration

Automatic SQL injection and database takeover tool

sqlmap-skynet
sqlmap-skynet
Open Source Kali Exploitation

SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools

sqlmap-wiki-zhcn
sqlmap-wiki-zhcn
Free Exploitation

GitBook 页面: [sqlmap.highlight.ink][host]

SQLMutant
SQLMutant
Open Source Exploitation Reconnaissance

SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. It f…

sshimpanzee
sshimpanzee
Open Source Exploitation Post-Exploitation

SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)

ssrf-exploit
ssrf-exploit
Open Source Kali Exploitation Web Application

an exploit of Server-side request forgery (SSRF)

SSRFmap
SSRFmap
Open Source Exploitation Web Application

Automatic SSRF fuzzer and exploitation tool

SSRFPwned
SSRFPwned
Open Source Exploitation Web Application

Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRF

SteppingStones
SteppingStones
Open Source Exploitation Post-Exploitation

A hub for Red Team activity to aid in record keeping, situational awareness and reporting. Stepping Stones provides a web based UI for the t…

Stowaway
Stowaway
Open Source Exploitation

👻Stowaway -- Multi-hop Proxy Tool for pentesters

stuff
stuff
Open Source Exploitation Reverse Engineering

Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest

stunner
stunner
Free Exploitation

Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.

SUASS
SUASS
Open Source Exploitation

one-stop resource for all things offensive security.

subVerison_GTAV_Hack
subVerison_GTAV_Hack
Open Source Exploitation

武器

SUDO_KILLER
SUDO_KILLER
Open Source Exploitation Post-Exploitation

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific m…

SUID3NUM
SUID3NUM
Open Source Exploitation Post-Exploitation

A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binari…