• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

exploitation

  1. dEEpEst

    FTP Server Exploitation

    FTP Server Exploitation: Pen Testing Port 21 Like a Pro Description: FTP servers running on Port 21 are prime targets for attackers—but for ethical hackers, they’re a goldmine for security testing. Whether you're a penetration tester, cybersecurity analyst, or red teamer, understanding FTP...
  2. itsMe

    Exploitation with Kali Linux

    Description Kali contains an array of tools to assist with security assessments and penetration tests. This course will teach you how to use some of those tools to exploit the systems you find, moving you into a position to perform post exploitation tasks. A large number of security tools are...
  3. itsMe

    Bropper: automatic Blind ROP exploitation tool

    An automatic Blind ROP exploitation python tool Abstract BROP (Blind ROP) was a technique found by Andrew Bittau from Stanford in 2014.     Original paper     Slides Most servers like nginx, Apache, MySQL, and forks then communicate with the client. This means canary and addresses stay the...
  4. itsMe

    Exploitation with PowerShell

    Description Learning about PowerShell exploitation techniques and tools is of vital importance for successfully running red team operations or penetration tests in Windows environments. The ability to make use of readily available tools such as PowerShell when targeting Windows operating...
  5. itsMe

    PowerMeUp: powershell scripts for post exploitation

    This is a powershell reverse shell that executes the commands and or scripts that you add to the powerreverse.ps1 file as well as a small library of Post-Exploitation scripts. This also can be used for post-exploitation and lateral movement even. Please use it at your own risk I am not and will...
  6. itsMe

    Toxssin - An XSS Exploitation Command-Line Interface And Payload Generator

    Purpose toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of an https server that works as an interpreter for the traffic generated by the malicious JavaScript payload that powers this tool...
  7. itsMe

    WEF v1.0 releases: Wi-Fi Exploitation Framework

    A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA and WEP, automated hash cracking, Bluetooth hacking, and much more. I recommend you my alfa adapter: Alfa AWUS036ACM, which works really great with both, 2.4 and 5 Ghz Tested and supported...
  8. itsMe

    WEF: Wi-Fi Exploitation Framework

    A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA and WEP, automated hash cracking, Bluetooth hacking, and much more.     I recommend you my alfa adapter: Alfa AWUS036ACM, which works really great with both, 2.4 and 5 Ghz Tested and...
  9. itsMe

    Vortex - VPN Overall Reconnaissance, Testing, Enumeration And eXploitation Toolkit

    VPN Overall Reconnaissance, Testing, Enumeration and Exploitation Toolkit Overview A very simple Python framework, inspired by SprayingToolkit, that tries to automate most of the process required to detect, enumerate and attack common O365 and VPN endpoints (like Cisco, Citrix, Fortinet...
  10. itsMe

    SharpStrike - A Post exploitation tool

    A Post exploitation tool written in C# uses either CIM or WMI to query remote systems. Introduction SharpStrike is a C# rewrite and expansion on @Matt_Grandy_'s CIMplant and @christruncer's WMImplant. SharpStrike allows you to gather data about a remote system, execute commands, exfil data...
  11. itsMe

    RomBuster - A Router Exploitation Tool

    RomBuster is a router exploitation tool that allows to disclosure network router admin password. Features     Exploits vulnerabilities in most popular routers such as D-Link, Zyxel, TP-Link and Huawei.     Optimized to exploit multiple routers at one time from list.     Simple CLI and API...
  12. itsMe

    Reverse Engineering Offensive Software Exploitation (OSE) Course

    Offensive Software Exploitation (OSE) Course This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College and currently doing it for free online (check the YouTube channel for the recordings). Most of the slide notes I used are already shared on HTID...
  13. itsMe

    BlackMamba v1.0.41 - multi client C2/post exploitation framework

    BlackMamba BlackMamba is a multi-client C2/post-exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework. Some of BlackMamba features are:     Multi-Client – Supports multiple client connections at the same time.     Real-Time Communication Updates –...
  14. itsMe

    BlackMamba v1.0.24 - multi client C2/post exploitation framework

    BlackMamba BlackMamba is a multi-client C2/post-exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework. Some of BlackMamba features are:     Multi-Client – Supports multiple client connections at the same time.     Real-Time Communication Updates –...
  15. itsMe

    BlackMamba: multi client C2/post exploitation framework

    BlackMamba BlackMamba is a multi-client C2/post exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework. Some of BlackMamba features are:     Multi-Client – Supports multiple client connections at the same time.     Real-Time Communication Updates –...
  16. itsMe

    Fortiscan - A High Performance FortiGate SSL-VPN Vulnerability Scanning And Exploitation Tool

    A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool. Requirements Tested with Parrot & Debian Operating Systems and Windows 10 Hidden content
  17. itsMe

    shad0w: post exploitation framework

    SHAD0W is a modular C2 framework designed to successfully operate in mature environments. It will use a range of methods to evade EDR and AV while allowing the operator to continue using tooling tradecraft they are familiar with. It’s powered by Python 3.8 and C, using Donut for payload...
  18. itsMe

    Pown v2.22.1 - security testing an exploitation toolkit

    Pown Pown.js is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like Metasploit, Pown.js considers frameworks to be an anti-pattern. Therefore, each module in Pown is, in fact, a standalone NPM module allowing a greater degree of...
  19. itsMe

    [BlackHat tool] BOtB v1.8 - A container analysis and exploitation tool

    Break out the Box (BOtB) BOtB is a container analysis and exploitation tool designed to be used by pentesters and engineers while also being CI/CD friendly with common CI/CD technologies. What does it do? BOtB is a CLI tool which allows you to:     Exploit common container vulnerabilities...
  20. itsMe

    Bashark v1.0 - Post exploitation toolkit

    Introduction Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Hidden content
Back
Top