Exploitation

Explore 55 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

ARM Assembly and Shellcode Logo

A comprehensive collection of resources for learning ARM assembly language and shellcode development.

0
TikiTorch Logo

TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.

0
mach_inject Logo

A Mac OS X code injection library that enables copying code into target processes and remotely executing it through new thread creation.

0
CrackMapExec Logo

A post-exploitation tool for pentesting Active Directory

0
sixnet-tools Logo

Python exploitation tool for gaining root access to Sixnet RTUs in SCADA networks by exploiting application-level vulnerabilities.

0
Nimbostratus Logo

A proof-of-concept toolkit for fingerprinting and exploiting Amazon Web Services cloud infrastructures using the boto library.

0
Commix Logo

Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.

0