Exploitation Tools

997 tools
titus
titus
Open Source Exploitation

High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential vali…

Tomcat-webshell-application
Tomcat-webshell-application
Free Exploitation

A webshell application and interactive shell for pentesting Apache Tomcat servers.

TOP
TOP
Free Exploitation

TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things

toxssin
toxssin
Open Source Exploitation Web Application

An XSS exploitation command-line interface and payload generator.

Tricks-Pentest-Android-and-iOS-Applications
Tricks-Pentest-Android-and-iOS-Applications
Free Exploitation

Some Useful Tricks for Pentest Android and iOS Apps

Tricks-Web-Pentest
Tricks-Web-Pentest
Free Exploitation

Web Application Penetration Testing

trivy
trivy
Open Source Exploitation

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

TryHackMe
TryHackMe
Open Source Exploitation Reconnaissance

Master cybersecurity skills with this TryHackMe free path, includes a collection of my write-ups, solutions and progress tracking.

tryhackme-ctf
tryhackme-ctf
Open Source Exploitation

TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.

TTPs
TTPs
Open Source Exploitation

Red Team Tactics, Techniques, and Procedures

turbo-attack
turbo-attack
Open Source Exploitation

A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers…

Twitch-Farmer
Twitch-Farmer
Free Exploitation

A bot that helps you to get more followers on Twitch

tx2hax
tx2hax
Free Exploitation

This is a mirror of https://codeberg.org/katze/tx2hax

udbg
udbg
Free Exploitation Reverse Engineering

Cross-platform library for binary debugging and memory hacking written in Rust

udpih
udpih
Open Source Exploitation

Exploit for the Wii U's USB Host Stack

unauthorized
unauthorized
Free Exploitation

项目包含1 、FTP 未授权访问(21) 2 、LDAP 未授权访问(389) 3 、Rsync 未授权访问(873) 4 、ZooKeeper 未授权访问(2181) 5 、Docker 未授权访问(2375) 6 、Docker Registry未授权(5000) 7 、Ki…

unauthorized_com
unauthorized_com
Free Exploitation

未授权检测的命令行版V1.0,支持批量检测,导出结果,项目参考sqlmap使用随机user-agent。本项目有两个版本,一个是带有GUI界面的,一个是命令行版本,未授权检测目前不包括默认密码检测

UnderlayCopy
UnderlayCopy
Free Exploitation

PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads

Unicorn
Unicorn
Open Source Evasion Exploitation

Simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Works with Metasploit payloads and custom she…

upgopher
upgopher
Open Source Exploitation

This is a simple Go web server that allows users to upload files and view a list of the uploaded files. The server can be run locally or dep…

urlcrazy
urlcrazy
Free Kali Exploitation Reconnaissance

Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.

username-anarchy
username-anarchy
Open Source Kali Exploitation Reconnaissance

Username tools for penetration testing

uusec-waf
uusec-waf
Open Source Exploitation Web Application

Industry-leading free, high-performance, AI and semantic technology Web Application Firewall and API Security Gateway (WAAP) - UUSEC WAF.

uwd
uwd
Open Source Exploitation

Rust library for call stack spoofing on Windows, allowing you to execute arbitrary functions with a forged call stack that evades analysis, …