Skip to content
#

exploit

Here are 1,680 public repositories matching this topic...

This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated Oct 2, 2022
  • Jupyter Notebook
Ladon

Ladon modular hacking framework penetration scanner & Cobalt strike, Ladon 9.2.1 has 171 built-in modules, including information collection / surviving host / port scanning / service identification / password blasting / vulnerability detection / vulnerability utilization. Vulnerability detection includes ms17010 / smbghost / Weblogic / ActiveMQ / Tomcat / Struts2, password and password blasting (MySQL / Oracle / MSSQL) / ftp / SSH (Linux) / VNC / windows (IPC / WMI / SMB / NetBIOS / LDAP / smbhash / wmihash / winrm), remote execution of commands (smbexec / wmieexe / psexec / atexec / sshexec / webshell), lowering and lifting of rights runas, getsystem, POC / exploit, support for global strike 3.x-4.0

  • Updated Sep 11, 2022
  • C#

Improve this page

Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."

Learn more