410 skills found · Page 12 of 14
Shivangx01b / Exploitdb SearchExploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks and some scrapping to make the exploit searching easy as searcsploit
UsamaMatrix / WPS ExploitationA Python script for exploiting WPS to retrieve WPA/WPA2 passphrases using Reaver.
shyambhanushali / React2ShellReact2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC).
mukarramkhalid / Root Exploiter Php Python[PHP][Python] Root Exploiter – No Back-Connect
Fare9 / PyWerkzeug Debug Command Executionpython exploit for werkzeug debug shell command execution
thegsoinfosec / Impacket ExtraExtra Python exploits from Impacket: wmiexec.py ntlmrelayx.py smbexec.py and more
l-urk / CVE 2024 6387Proof of concept python script for regreSSHion exploit.
AndreyRainchik / CVE 2020 8816A Python script to exploit CVE-2020-8816, a remote code execution vulnerability on the Pi-hole
freddiebarrsmith / ARP Sniffer SpooferARP Exploitation in Python
LiamAs05 / Auto PentesterFinal year project in Magshimim, focusing on Python development and Web Exploitation.
technopwnsauce / Wps PwnInteractive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illegal activity engage in, i.e. running this on access points you do not own.)
fin3ss3g0d / CVE 2024 4956CVE-2024-4956 Python exploitation utility
ivanitlearning / CVE 2017 17562Standalone Python 3 exploit for CVE-2017-17562
UND3F3IND / Cpanel Whm Ssh Ftp ExploitThis Python script exploits vulnerabilities in systems like cPanel, WHM, SSH, and FTP. It uses multiprocessing or threading to execute exploits, taking input from lists or prompts. The console displays the success or failure of the exploits.
BroadbentT / BINARY MASTERA python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.
jbonagura / CVEpwnCVEpwn is a python tool designed to search for exploits related to CVE vulnerabilities across multiple platforms like GitHub, ExploitDB, and CXSecurity. It helps security professionals and researchers find potential exploits for discovered vulnerabilities.
GeneralTesler / CVE 2016 10033RCE against WordPress 4.6; Python port of https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html
cloudburst / Pyfmtstrpython format string exploitation library
livepwn / LiveexploitLive Exploit is a powerful and versatile Python-based tool designed for Capture The Flag (CTF) challenges, exploit development, and vulnerability research.
Leci37 / SueGAN LLM To Generate Exploit CodesIs it possible for the AI (GAN Generative Adversarial Network) to generate exploit hack codes (in this first version only python) automatically?