Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

vulnerability-exploitation

Here are 12 public repositories matching this topic...

Jie stands out as a comprehensive security assessment and exploitation tool meticulously crafted for web applications. Its robust suite of features encompasses vulnerability scanning, information gathering, and exploitation, elevating it to an indispensable toolkit for both security professionals and penetration testers. 挖洞辅助工具(漏洞扫描、信息收集)

  • UpdatedJul 5, 2024
  • Go

XSSblitz ⚡ is a blazing-fast 🚀 and modern 🖥️ XSS vulnerability scanner 🔍, designed to help you effortlessly uncover 🕵️‍♂️ and exploit XSS vulnerabilities 💥 with ease.

  • UpdatedDec 31, 2024
  • Python

This repository provides easy-to-follow methods for gaining admin rights (privilege escalation) on Windows 10, 11, and newer systems. Learn how to identify and exploit misconfigurations, weak permissions, and common security flaws to escalate user privileges. Perfect for ethical hackers, penetration testers, and security researchers looking to test

  • UpdatedOct 22, 2024
  • HTML

🔒 Internal Network Penetration Testing – A complete module covering methodologies, attack vectors, tools, and hands-on labs to assess and exploit security weaknesses within internal networks.

  • UpdatedOct 15, 2025

Path Traversal automation vulnerability scanner tool.

  • UpdatedDec 27, 2024
  • Python

A website for understanding, exploiting, and preventing common vulnerabilities in Laravel applications. Includes examples, prevention techniques, and best practices for secure Laravel development.

  • UpdatedFeb 25, 2025
  • PHP

Web Security Capture The Flag (CTF) challenge implemented using Flask and Docker.

  • UpdatedApr 15, 2025
  • Python

This project demonstrates ARP Poisoning, a Man-in-the-Middle (MITM) attack, using Kali Linux and Windows 11. Tools like Wireshark and Ettercap were employed to intercept network traffic and exploit vulnerabilities, highlighting the risks of data theft and unauthorized access.

  • UpdatedSep 19, 2024

CTF challenge involving Flask web applications running on multiple ports, requiring network scanning and exploitation to retrieve hidden flags.

  • UpdatedOct 5, 2025
  • Python

Improve this page

Add a description, image, and links to thevulnerability-exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with thevulnerability-exploitation topic, visit your repo's landing page and select "manage topics."

Learn more


[8]ページ先頭

©2009-2025 Movatter.jp