vulnerability-exploitation
Here are 12 public repositories matching this topic...
Sort:Most stars
Jie stands out as a comprehensive security assessment and exploitation tool meticulously crafted for web applications. Its robust suite of features encompasses vulnerability scanning, information gathering, and exploitation, elevating it to an indispensable toolkit for both security professionals and penetration testers. 挖洞辅助工具(漏洞扫描、信息收集)
- Updated
Jul 5, 2024 - Go
XSSblitz ⚡ is a blazing-fast 🚀 and modern 🖥️ XSS vulnerability scanner 🔍, designed to help you effortlessly uncover 🕵️♂️ and exploit XSS vulnerabilities 💥 with ease.
- Updated
Dec 31, 2024 - Python
This repository provides easy-to-follow methods for gaining admin rights (privilege escalation) on Windows 10, 11, and newer systems. Learn how to identify and exploit misconfigurations, weak permissions, and common security flaws to escalate user privileges. Perfect for ethical hackers, penetration testers, and security researchers looking to test
- Updated
Oct 22, 2024 - HTML
🔒 Internal Network Penetration Testing – A complete module covering methodologies, attack vectors, tools, and hands-on labs to assess and exploit security weaknesses within internal networks.
- Updated
Oct 15, 2025
Path Traversal automation vulnerability scanner tool.
- Updated
Dec 27, 2024 - Python
Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️
- Updated
Nov 29, 2025
A website for understanding, exploiting, and preventing common vulnerabilities in Laravel applications. Includes examples, prevention techniques, and best practices for secure Laravel development.
- Updated
Feb 25, 2025 - PHP
Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️
- Updated
Feb 8, 2025
Web Security Capture The Flag (CTF) challenge implemented using Flask and Docker.
- Updated
Apr 15, 2025 - Python
🔓 Explore the Metasploit Framework 2025 for advanced penetration testing and security auditing to identify vulnerabilities in networks and applications.
- Updated
Sep 7, 2025
This project demonstrates ARP Poisoning, a Man-in-the-Middle (MITM) attack, using Kali Linux and Windows 11. Tools like Wireshark and Ettercap were employed to intercept network traffic and exploit vulnerabilities, highlighting the risks of data theft and unauthorized access.
- Updated
Sep 19, 2024
CTF challenge involving Flask web applications running on multiple ports, requiring network scanning and exploitation to retrieve hidden flags.
- Updated
Oct 5, 2025 - Python
Improve this page
Add a description, image, and links to thevulnerability-exploitation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with thevulnerability-exploitation topic, visit your repo's landing page and select "manage topics."