Statistics for topic exploitation
RepositoryStats tracks 641,723 Github repositories, of these 164 are tagged with the exploitation topic. The most common primary language for repositories using this topic is Python (59). Other languages include: Shell (14), C (13)
Stargazers over time for topic exploitation
Most starred repositories for topic exploitation (view more)
Trending repositories for topic exploitation (view more)
A collection of hacking tools, resources and references to practice ethical hacking.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Master cybersecurity skills with this TryHackMe free path, includes a collection of my write-ups, solutions and progress tracking.
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
A collection of hacking tools, resources and references to practice ethical hacking.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
A collection of hacking tools, resources and references to practice ethical hacking.
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
Articles and tools related to research in the Apple environment (mainly macOS).
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The project models the problem as a sequence of actions to achie...
A collection of hacking tools, resources and references to practice ethical hacking.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
Some Useful Tricks for Pentest Android and iOS Apps
Articles and tools related to research in the Apple environment (mainly macOS).