Exploitation Tools

997 tools
caldera
caldera
Open Source Exploitation

Automated Adversary Emulation Platform

CamOver
CamOver
Open Source Exploitation

CamOver is a camera exploitation tool that allows to disclosure network camera admin password.

CamRaptor
CamRaptor
Open Source Exploitation

CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.

cariddi
cariddi
Open Source Exploitation Reconnaissance

Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more

cazador_unr
cazador_unr
Free Exploitation Reconnaissance

[scanner] [TcpListener] [FileMiner] [Subscrabber]…

CDK
CDK
Open Source Exploitation Post-Exploitation

📦 Make security testing of K8s, Docker, and Containerd easier.

Certified-Red-Team-Professional-CRTP---Notes
Certified-Red-Team-Professional-CRTP---Notes
Open Source Exploitation Post-Exploitation

Certified Red Team Professional (CRTP) - Notes

Certipy
Certipy
Open Source Exploitation Reconnaissance

Offensive tool for Active Directory Certificate Services (AD CS) enumeration and abuse. Finds and exploits ESC1-ESC13 misconfigurations in c…

cervantes
cervantes
Free Exploitation Scanning & Enumeration

Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive managem…

chainreactor
chainreactor
Free Exploitation Post-Exploitation

ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The …

chatlog
chatlog
Free Exploitation

chat log tool, easily use your own chat data. 聊天记录工具,轻松使用自己的聊天数据

cheatsheets
cheatsheets
Free Exploitation Post-Exploitation

Collection of knowledge about information security

Chisel
Chisel
Open Source Kali Exploitation Post-Exploitation

Fast TCP/UDP tunnel transported over HTTP and secured via SSH. Used for port forwarding and pivoting through restrictive firewalls. Single b…

ChromeAlone
ChromeAlone
Open Source Exploitation

A tool to transform Chromium browsers into a C2 Implant

Chromium-based-XSS-Taint-Tracking
Chromium-based-XSS-Taint-Tracking
Open Source Exploitation Web Application

The Cyclops's binary code can be directly downloaded here; It's source code is not provided now.

CL4R1T4S
CL4R1T4S
Open Source Exploitation

LEAKED SYSTEM PROMPTS FOR CHATGPT, GEMINI, GROK, CLAUDE, PERPLEXITY, CURSOR, DEVIN, REPLIT, AND MORE! - AI SYSTEMS TRANSPARENCY FOR ALL! 👐

ClatsCracker
ClatsCracker
Open Source Exploitation

ClatsCracker is a versatile Executable & Python based password-cracking tool supporting 25 hash algorithms. It offers dictionary or brute-fo…

Claude-Red
Claude-Red
Free Exploitation

claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file…

CloakQuest3r
CloakQuest3r
Open Source Exploitation Reconnaissance

Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy services…

cloud
cloud
Open Source Exploitation Reconnaissance

Monitoring the Cloud Landscape

cloud_osint
cloud_osint
Open Source Exploitation Reconnaissance

☁️ Curated Cloud OSINT resources — dorks, tools, and techniques for AWS, Azure, GCP, Oracle Cloud, and other major providers reconnaissance

CloudBrute
CloudBrute
Open Source Exploitation

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Aliba…

CloudIntel
CloudIntel
Open Source Exploitation Forensics

This repo contains IOC, malware and malware analysis associated with Public cloud

cobaltstrike-beacon-rust
cobaltstrike-beacon-rust
Free Exploitation

change C2_GET_URL, C2_POST_URL, USER_AGENT, BEACON_KEYS_PATH in generate_config.py