Exploitation Tools

997 tools
Sunder
Sunder
Open Source Exploitation

Windows rootkit designed to work with BYOVD exploits

superman
superman
Open Source Exploitation

🤖 Kill The Protected Process 🤖

Supernova
Supernova
Open Source Evasion Exploitation

Real fucking shellcode encryptor & obfuscator tool

swarmer
swarmer
Open Source Exploitation Post-Exploitation

A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN

Synergy-httpx
Synergy-httpx
Open Source Exploitation

A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conten…

SysCaller
SysCaller
Open Source Evasion Exploitation

SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!

TangGo
TangGo
Free Exploitation Scanning & Enumeration

TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。

Tangled
Tangled
Open Source Exploitation Social Engineering

Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.

TangledWinExec
TangledWinExec
Open Source Exploitation Reverse Engineering

PoCs and tools for investigation of Windows process execution techniques

tap-ducky
tap-ducky
Open Source Exploitation

Turns any rooted phone into the legendary USB Rubber Ducky. Android USB HID Keystroke Injector

TeamsEnum
TeamsEnum
Open Source Exploitation Reconnaissance

User Enumeration of Microsoft Teams users via API

tensorflow-rce
tensorflow-rce
Open Source Exploitation

RCE PoC for Tensorflow using a malicious Lambda layer

TerminatorZ
TerminatorZ
Open Source Exploitation

TerminatorZ is a highly sophisticated and efficient Offensive CVE Exploitation Framework that scans for top potential vulnerabilities with k…

THC-Archive
THC-Archive
Free Exploitation

All releases of the security research group (a.k.a. hackers) The Hacker's Choice

THE_HIVE
THE_HIVE
Free Exploitation Reverse Engineering

My public notes about offensive security

the-nuclei-templates
the-nuclei-templates
Open Source Exploitation Scanning & Enumeration

Nuclei templates written by geeknik. Claude is my co-pilot. 🤖

TheBigBrother
TheBigBrother
Open Source Exploitation Reconnaissance

The Big Brother V4.0 is a weaponized OSINT platform featuring username enumeration (473+ platforms), quad-vector visual intelligence, Sky Ra…

theHarvester
theHarvester
Free Kali Exploitation Reconnaissance

E-mails, subdomains and names Harvester - OSINT

TheTick
TheTick
Open Source Exploitation

The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.

thread_namecalling
thread_namecalling
Free Exploitation

Process Injection using Thread Name

ThreatHunting-Keywords
ThreatHunting-Keywords
Free Exploitation Forensics

Awesome list of keywords and artifacts for Threat Hunting sessions

ThreatIntelligence
ThreatIntelligence
Free Exploitation Post-Exploitation

This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals…

ThreatTracer
ThreatTracer
Open Source Exploitation

ThreatTracer - A tool to identify CVE by name & version and more by @FR13ND0x7F

TibaneC2
TibaneC2
Open Source Exploitation Post-Exploitation

A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).