BOFTools
Vulnerability exploitation toolkit
A collection of tools and techniques for exploiting vulnerabilities in software applications.
存储练习项目,目前有GetWeChatBOF
17 stars
2 watching
2 forks
Language: C
last commit: over 1 year ago Related projects:
Repository | Description | Stars |
---|---|---|
1n3/intruderpayloads | A collection of tools and methodologies for simulating web application attacks | 3,681 |
firebasky/csrouge | A tool that exploits vulnerabilities in web servers to execute arbitrary code | 9 |
mubix/post-exploitation | A collection of post-exploitation tools and scripts for various operating systems. | 1,554 |
gmatuz/inthewilddb | A comprehensive database of vulnerability and exploitation reports | 245 |
appknox/afe | A framework that enables exploitation of Android devices and applications using Python | 186 |
darkcode357/thg-framework | A Python-based toolkit for rapid exploit development and testing | 8 |
outflanknl/c2-tool-collection | Tools for exploiting vulnerabilities in Windows systems and gathering information about networked computers. | 1,143 |
atorrescogollo/offensive-tor-toolkit | A toolkit for utilizing Tor network for various exploitation and post-exploitation tasks. | 58 |
freefv/tencent_yun_tools | A collection of Python scripts to exploit vulnerabilities in Tencent Cloud services using an AccessKey | 34 |
ekultek/pybelt | A collection of tools for hackers and security researchers to explore vulnerabilities and test systems | 511 |
arimogi/google-dorks | A collection of tools and techniques for exploiting vulnerabilities in Google services | 45 |
lockedbyte/cve-exploits | A collection of proof-of-concept exploits for specific software vulnerabilities | 675 |
billy-ellis/exploit-challenges | A collection of vulnerable ARM binaries designed to help practitioners develop exploit development skills | 898 |
qazbnm456/vwgen | Automates the creation of vulnerable web applications for testing and security research purposes. | 84 |
hardik05/damn_vulnerable_c_program | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 676 |