Exploitation Framework for Embedded Devices
-
Updated
Jan 25, 2025 - Python
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Exploitation Framework for Embedded Devices
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.
针对SpringBoot的开源渗透框架,以及Spring相关高危漏洞利用工具
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Find exploit tool
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有13w+POC,已校验有效性并去重)
The EXCLUSIVE Collection of 50,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
The Correlated CVE Vulnerability And Threat Intelligence Database API
kernel privilege escalation enumeration and exploitation framework
分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
for mass exploiting
A collection of curated Java Deserialization Exploits
RomBuster is a router exploitation tool that allows to disclosure network router admin password.
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer securit…
Vulners Python API wrapper
Exploits and Security Tools Framework 2.0.1
Created by The cybersecurity community