Exploitation
15 tools indexed
Exploitation frameworks, payload generators, post-exploitation tools, and privilege escalation utilities. These tools are used in penetration testing and red team operations to demonstrate the real-world impact of discovered vulnerabilities.
Metasploit Framework
The world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
BloodHound
Active Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Impacket
Collection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
CrackMapExec
Swiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Evil-WinRM
Ultimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
Covenant
.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.
Sliver
Open-source C2 framework by BishopFox. mTLS, HTTP(S), DNS, WireGuard implants with multi-operator support.
Ligolo-ng
Advanced tunneling/pivoting tool. Creates a TUN interface for transparent proxying through compromised hosts.
Chisel
Fast TCP/UDP tunnel over HTTP secured via SSH. Single binary, works behind firewalls and NAT.
LinPEAS
Linux privilege escalation enumeration script. Finds misconfigs, SUID bins, creds, and escalation paths.
pspy
Monitor Linux processes without root. Detects cron jobs, user commands, and process events in real time.
TheFatRat
Exploit and payload generator. Creates backdoors with msfvenom, compiles with anti-AV evasion techniques.
SearchSploit
Command-line tool for searching Exploit-DB — find public exploits and shellcode for known vulnerabilities offline.
pwntools
CTF framework and exploit development library for rapid prototyping of binary exploitation and reverse engineering.
Ropper
Display and search for ROP/JOP/SOP gadgets in binaries to assist with exploit development and bypass mitigations.