Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

vulnerability-exploitation

Here are 12 public repositories matching this topic...

Jie stands out as a comprehensive security assessment and exploitation tool meticulously crafted for web applications. Its robust suite of features encompasses vulnerability scanning, information gathering, and exploitation, elevating it to an indispensable toolkit for both security professionals and penetration testers. ζŒ–ζ΄žθΎ…εŠ©ε·₯ε…·(ζΌζ΄žζ‰«ζγ€δΏ‘ζ―ζ”Άι›†)

  • Updated Jul 5, 2024
  • Go

XSSblitz ⚑ is a blazing-fast πŸš€ and modern πŸ–₯️ XSS vulnerability scanner πŸ”, designed to help you effortlessly uncover πŸ•΅οΈβ€β™‚οΈ and exploit XSS vulnerabilities πŸ’₯ with ease.

  • Updated Dec 31, 2024
  • Python

πŸ”’ Internal Network Penetration Testing – A complete module covering methodologies, attack vectors, tools, and hands-on labs to assess and exploit security weaknesses within internal networks.

  • Updated Oct 15, 2025

This repository provides easy-to-follow methods for gaining admin rights (privilege escalation) on Windows 10, 11, and newer systems. Learn how to identify and exploit misconfigurations, weak permissions, and common security flaws to escalate user privileges. Perfect for ethical hackers, penetration testers, and security researchers looking to test

  • Updated Oct 22, 2024
  • HTML

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. πŸ”“πŸ› οΈ

  • Updated Oct 17, 2025

This project demonstrates ARP Poisoning, a Man-in-the-Middle (MITM) attack, using Kali Linux and Windows 11. Tools like Wireshark and Ettercap were employed to intercept network traffic and exploit vulnerabilities, highlighting the risks of data theft and unauthorized access.

  • Updated Sep 19, 2024

Improve this page

Add a description, image, and links to the vulnerability-exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vulnerability-exploitation topic, visit your repo's landing page and select "manage topics."

Learn more

AltStyle γ«γ‚ˆγ£γ¦ε€‰ζ›γ•γ‚ŒγŸγƒšγƒΌγ‚Έ (->γ‚ͺγƒͺγ‚ΈγƒŠγƒ«) /