Exploitation
22 tools indexed
Exploitation frameworks, payload generators, post-exploitation tools, and privilege escalation utilities. These tools are used in penetration testing and red team operations to demonstrate the real-world impact of discovered vulnerabilities.
Metasploit Framework
The world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
BloodHound
Active Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Impacket
Collection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
CrackMapExec
Swiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Evil-WinRM
Ultimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
Covenant
.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.
Sliver
Open-source C2 framework by BishopFox. mTLS, HTTP(S), DNS, WireGuard implants with multi-operator support.
Ligolo-ng
Advanced tunneling/pivoting tool. Creates a TUN interface for transparent proxying through compromised hosts.
Chisel
Fast TCP/UDP tunnel over HTTP secured via SSH. Single binary, works behind firewalls and NAT.
LinPEAS
Linux privilege escalation enumeration script. Finds misconfigs, SUID bins, creds, and escalation paths.
pspy
Monitor Linux processes without root. Detects cron jobs, user commands, and process events in real time.
TheFatRat
Exploit and payload generator. Creates backdoors with msfvenom, compiles with anti-AV evasion techniques.
SearchSploit
Command-line tool for searching Exploit-DB - find public exploits and shellcode for known vulnerabilities offline.
pwntools
CTF framework and exploit development library for rapid prototyping of binary exploitation and reverse engineering.
Ropper
Display and search for ROP/JOP/SOP gadgets in binaries to assist with exploit development and bypass mitigations.
RouterSploit
Open-source exploitation framework for embedded devices and routers.
ROPgadget
Search ROP gadgets in binaries for chain-building across ELF, PE, and Mach-O.
one_gadget
Find one-gadget RCE execve calls in libc for streamlined exploit development.
RsaCtfTool
RSA multi-attack tool for recovering private keys from weak public keys.
git-dumper
Dumps exposed .git repositories from web servers, reconstructing the full source code and commit history.
CAPEv2
Malware behavior analysis sandbox. Detonates samples and extracts configs, payloads, network IOCs, and API call traces.
DllShimmer
Weaponizes DLL hijacking by generating proxy DLLs with matching export address tables and C++ backdoor boilerplate.