• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

exploitation

  1. itsMe

    Vailyn v1.5.1-3 - phased, evasive Path Traversal scanning & exploitation tool

    Vailyn is a multi-phased vulnerability analysis and exploitation tool for path traversal/directory climbing vulnerabilities. It is built to make it as performant as possible and to offer a wide arsenal of filter evasion techniques. How does it work? Vailyn operates in 2 phases. First, it checks...
  2. itsMe

    CMSeeK v.1.1.3 – K-RONA - CMS detection and exploitation tool

    Introduction CMSeeK is a CMS detection and exploitation tool, written in Python3, capable of scanning numerous content management systems including WordPress, Joomla, Drupal, etc. It allows you to run both simple CMS detection and deep scans, as well as multisite scans. Currently it can be ran...
  3. itsMe

    Commix v3.1 - Automated All-in-One OS command injection and exploitation tool

    Commix (short for [comm]and njection e[x]ploiter) is an automated tool written by Anastasios Stasinopoulos (@ancst) that can be used from web developers, penetration testers or even security researchers in order to test web-based applications with the view to find bugs, errors or vulnerabilities...
  4. itsMe

    Bashark v1.0 - Bash post exploitation toolkit

    Introduction Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Features     Single Bash script     Lightweight and fast     Multi-platform: Unix, OSX, Solaris etc.     No external dependencies     Immune to heuristic and behavioural...
  5. dEEpEst

    Pown.js - A Security Testing An Exploitation Toolkit

    Pown Pown.js is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like Metasploits, Pown.js considers frameworks to be an anti-pattern. Therefore, each module in Pown is in fact a standalone NPM module allowing greater degree of...
  6. itsMe

    enumdb v2.1 MySQL and MSSQL brute force and post exploitation tool

    Enumdb is a brute force and post exploitation tool for MySQL and MSSQL databases. When provided a list of usernames and/or passwords, it will cycle through each targeted host looking for valid credentials. By default, enumdb will use newly discovered credentials to search for sensitive...
  7. itsMe

    Exploitivator - Automate Metasploit Scanning And Exploitation

    This has only been tested on Kali. It depends on the msfrpc module for Python, described in detail here: https://www.trustwave.com/Resources/SpiderLabs-Blog/Scripting-Metasploit-using-MSGRPC/ Install the necessary Kali packages and the PostgreSQL gem for Ruby: apt-get install postgresql...
  8. dEEpEst

    BeEF The Browser Exploitation Framework

    BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture...
  9. itsMe

    CMSeeK v1.1.2 - CMS Detection And Exploitation Suite

    CMS Detection And Exploitation Suite - Scan WordPress, Joomla, Drupal And Over 170 Other CMSs What is a CMS? A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples...
  10. itsMe

    Zeebsploit - Web Scanner / Exploitation / Information Gathering

    zeebsploit is a tool for hacking searching for web information and scanning vulnerabilities of a web Hidden content
  11. dEEpEst

    SS7/Phone Exploitation

    Hidden content
  12. 1

    Exploits Exploitation Framework For STMicroelectronics DVB Chipsets

    A multitude of security issues exist within STMicroelectronics DVB chipsets including, but not limited to credential leakage, buffer overflow, and data leaks. This is the full release of both the whitepaper and dozens of proof of concept details. View the full article
  13. dEEpEst

    PRETty "PRinter Exploitation Toolkit" LAN automation tool

    PRETty "PRinter Exploitation Toolkit" LAN automation tool PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET againt each individual printer, PRETty will automatically discover and run choosen PRET payloads...
  14. itsMe

    SSRFmap - Automatic SSRF Fuzzer And Exploitation Tool

    SSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes a Burp request file as input and a parameter to fuzz. Hidden content
  15. 1

    Exploits Exploitation Framework For STMicroelectronics DVB Chipsets

    This detailed research paper discusses a multitude of security issues with STMicroelectronics DVB chipsets including, but not limited to credential leakage, buffer overflow, and data leaks. View the full article
  16. itsMe

    Commix v2.7 - Automated All-in-One OS Command Injection And Exploitation Tool

    Commix (short for [comm]and njection e[x]ploiter) is an automated tool written by Anastasios Stasinopoulos (@ancst) that can be used from web developers, penetration testers or even security researchers in order to test web-based applications with the view to find bugs, errors or vulnerabilities...
  17. dEEpEst

    Bashark - Bash Post Exploitation Toolkit

    Bashark Post exploitation toolkit written in pure Bash    Table of Contents Introduction Usage Features Demo License Introduction Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Usage To launch Bashark...
Back
Top