Showing 147 open source projects for "exploit"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Q4OS

    Q4OS

    Efficient, Rock Stable Operating System

    ...Thanks to unique Q4OS tools a user can rather easily achieve setup of a fitted system eliminating superfluous packages and libraries. Therefore Q4OS performs faster and more efficient, doesn't exploit memory and computing resources with useless tasks and processes. Another exclusive Q4OS feature is an optimized support for setting up Trinity desktop environment alongside the default Plasma desktop. Installed side by side, carefully separated, both ready to run as needed. Just select one at login.
    Leader badge
    Downloads: 9,702 This Week
    Last Update:
    See Project
  • 2
    Hardened Slarpx

    Hardened Slarpx

    Experimental hardened Linux based on Xennytsu and Poison engine

    ...Due to its highly restrictive firewall policy, anonymization tools and certain network protocols are intentionally unsupported. The distribution includes two custom security modules: Poison and Xennytsu. Poison disrupts the deterministic timing required by exploit code by injecting random delays when abnormal behavior is detected, reducing the reliability of timing-based attacks. Xennytsu activates if an attacker gains a shell or attempts memory manipulation, detecting such activity within approximately 250 milliseconds and immediately terminating the offending process. Beyond passive hardening, Slarpx focuses on active intervention, sabotage, and destruction of attack paths when necessary.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    Steal a Brainrot Script

    Steal a Brainrot Script

    Steal a Brainrot SCRIPT NO KEY - Anti Hit, ESP, Anti-Kick

    Steal a Brainrot Hack 2025 | Free Script with No Key, Auto Lock, Easy Executor Support Unlock powerful advantages in Steal a Brainrot with this free Roblox script – no key required, fully functional in 2025, and compatible with popular executors. Whether you're new to scripting or an experienced exploit user, this tool gives you the edge with auto-lock, auto-execute, and simple integration into your favorite Roblox executor. This guide also walks you through the setup, making it easy even for beginners to run the script successfully inside the Brainrot game environment. ⚙️ System Requirements: Platform: Roblox (PC only) Game: Steal a Brainrot Executors: https://sourceforge.net/projects/bunni-roblox-executor/ No antivirus or firewall blocking the executor Internet connection recommended for updates Download the Steal a Brainrot Hack for Free (2025 Edition) Enjoy smooth gameplay, quick setup, and powerful features with this no-key Roblox script.
    Leader badge
    Downloads: 325 This Week
    Last Update:
    See Project
  • 4
    SakenScript

    SakenScript

    Forsaken Hax/Script OP Auto-Bloqueo/Golpe Aimbot, Esp, Auto-Gener

    Exploit de Roblox, script de Roblox, presentación de scripts de Roblox , exploits de Roblox 2025, script de Synapse X, centro de scripts de Roblox, ejecutor de Roblox, hack de Roblox, trucos de Roblox , presentación de scripts, Dashblox, scripts LUA de Roblox , tutorial de exploits de Roblox, KRNL de Roblox, el mejor script de Roblox , bypass de Roblox, sistema sin clave de Roblox, script de Roblox 2025, scripts gratuitos de Roblox, exploits de Roblox funcionales , interfaz gráfica de usuario de Roblox actualizada, ejecutor de scripts de Roblox, autogranja de Roblox, script ESP de Roblox, noclip de Roblox, scripts de FE de Roblox, centro de FE de Roblox, script de animación de Roblox, script de administrador de FE de Roblox Script de Forsaken, Pastebin de script de Forsaken, nuevo script de Forsaken, script para Forsaken, script de Forsaken 2025, script de Forsaken Móvil, script móvil de Forsaken, script de Forsaken en Roblox, créditos del script de Forsaken,
    Leader badge
    Downloads: 105 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    OWASP Juice Shop

    OWASP Juice Shop

    Probably the most modern and sophisticated insecure web application

    ...It was the first application written entirely in JavaScript listed in the OWASP VWA Directory. The application contains a vast number of hacking challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. Finding this score board is actually one of the (easy) challenges! Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a "guinea pig"-application to check how well their tools cope with JavaScript-heavy application frontends and REST APIs.
    Leader badge
    Downloads: 145 This Week
    Last Update:
    See Project
  • 6

    Crypto Arbitrage Bot

    Smart bot for crypto arbitrage across multiple DEXs.

    The bot persistently monitors the prices of specific assets across various decentralized exchanges, seeking opportunities to buy low on one platform and sell higher on another. When a profitable arbitrage chance emerges, it automatically carries out the transactions to exploit the price differences and generate gains. By continuously tracking multiple DEX platforms, the bot evaluates live market data to identify instances where an asset's price significantly diverges across exchanges.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    Crypto Arbitrage Bot

    The bot seeks arbitrage opportunities on DEX for profit.

    The bot persistently monitors the prices of specific assets across various decentralized exchanges, seeking opportunities to buy low on one platform and sell higher on another. When a profitable arbitrage chance emerges, it automatically carries out the transactions to exploit the price differences and generate gains. By continuously tracking multiple DEX platforms, the bot evaluates live market data to identify instances where an asset's price significantly diverges across exchanges. Aviable DEXs: Uniswap V3 Trader Joe Sushiswap Pancakeswap dYdX
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    VcenterKit

    VcenterKit

    Vcenter Comprehensive Penetration and Exploitation Toolkit

    VcenterKit is a Python-based toolkit focused on penetration testing and exploitation targeting VMware vCenter environments, giving security researchers and red team professionals a consolidated toolset to assess and exploit known vulnerabilities. The project includes modules that automate the detection and exploitation of specific CVEs (common vulnerabilities and exposures) in vCenter servers, often used to manage virtual infrastructure in enterprise environments. With features tailored toward reconnaissance, vulnerability triggering, and payload generation, the toolkit helps testers simulate real-world attack vectors on vulnerable vCenter instances. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Infection Monkey

    Infection Monkey

    Infection Monkey is a automated security testing tool for networks

    Infection Monkey is a open source automated security testing tool for testing a network's security baseline. Monkey is a tool that infects machines and propagates and Monkey Island is the server for an administrator to control and visualize progress of Infection Monkey.
    Downloads: 18 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10

    SGraph

    Create charts by retrieving data from Stata on-the-fly

    SGraph is a web application that interacts with Stata for creating graphs. It is a demo application that demostrates how to exploit SWire for creating web applications that communicate with Stata. SGraph is an open source project and you can download the code from the project web site web site or try the app on-line here: http://sgraph-with-swire.sourceforge.net/ The source project is hosted in GitHub: https://github.com/lomagno/sgraph
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Xonotic

    Xonotic

    Superproject containing build scripts and tools to download assets

    ...Players can enjoy a wide variety of multiplayer game modes—from traditional deathmatch and team captures to experimental variations like Nexball and Freeze Tag—each designed to exploit high mobility and deep map knowledge. The game includes dozens of official and community-created maps, robust server browsing, customizable HUD and controls, and even an integrated statistics system called XonStat for tracking performance.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    KubiScan

    KubiScan

    A tool to scan Kubernetes cluster for risky permissions

    A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model. KubiScan helps cluster administrators identify permissions that attackers could potentially exploit to compromise the clusters. This can be especially helpful on large environments where there are lots of permissions that can be challenging to track. KubiScan gathers information about risky roles\clusterroles, rolebindings\clusterrolebindings, users and pods, automating traditional manual processes and giving administrators the visibility they need to reduce risk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ProxSDP.jl

    ProxSDP.jl

    Semidefinite programming optimization solver

    ProxSDP is an open-source semidefinite programming (SDP) solver based on the paper "Exploiting Low-Rank Structure in Semidefinite Programming by Approximate Operator Splitting". The main advantage of ProxSDP over other state-of-the-art solvers is the ability to exploit the low-rank structure inherent to several SDP problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    TheMatrixVM
    ...Perform an NMAP scan like how Trinity did to hack the grid! try all ports :) 6. Good luck and enjoy the CTF! Learning Pre-Requisites - This VM does not require exploiting a CVE, or use of MetaSploit/Commercial exploit tools. - Requires intermediary knowlege of linux as it is based on Alpine.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 15
    Stars! Nova
    Stars! Nova is a clone of the classic 4X space strategy game Stars!. While nowhere near the functionality of Stars! quite a few features have been implemented so far. See the Nova web page for details.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Glide Wrapper, primarily DirectX9 based, intended to exploit pixel shaders, and supporting 3D montors
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    kotlinLab

    A MATLAB-like scientific programming environment for Kotlin and Java

    ...The KotlinLab user can work either with a MATLAB-like command console, or with a flexible editor based on the rsyntaxarea component, that offers more convenient code development. KotlinLab supports extensive plotting facilities and can exploit effectively a lot of powerful Java scientific libraries, as JLAPACK , Apache Common Maths , EJML , MTJ , NUMAL translation to Java , Numerical Recipes Java translation , Colt etc. KotlinLab aims to explore the superb DSL construction facilities of the Kotlin Language and the JShell environment of Java to provide an effective scientific programming environment for the JVM. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    ...While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is important to run the exploit to simulate a real-world attack that will be used to determine corporate resilience across the network. When running an exploit, it will practice the organization's cyber event management, which doesn't happen when scanning for cluster issues. It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Dosa OS

    Dosa OS

    DOSA OS : Network Security Assessment & Penetration Testing VM

    This project is designed for network penetration testing and vulnerability assessment. We have focused on setting up various attack scenarios by developing a variety of tools that can be used to exploit a network’s weakness. We aim to create an operating system based on Debian specifically for penetration testing.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    Robust Video Matting (RVM)

    Robust Video Matting (RVM)

    Robust Video Matting in PyTorch, TensorFlow, TensorFlow.js, ONNX

    ...Our method is much lighter than previous approaches and can process 4K at 76 FPS and HD at 104 FPS on an Nvidia GTX 1080Ti GPU. Unlike most existing methods that perform video matting frame-by-frame as independent images, our method uses a recurrent architecture to exploit temporal information in videos and achieves significant improvements in temporal coherence and matting quality. Furthermore, we propose a novel training strategy that enforces our network on both matting and segmentation objectives. This significantly improves our model's robustness. Our method does not require any auxiliary inputs such as a trimap or a pre-captured background image, so it can be widely applied to existing human matting applications. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 21
    0xsp Mongoose RED for Windows

    0xsp Mongoose RED for Windows

    Framework for cybersecurity simulation and red teaming operations

    0xsp mongoose red version is provided to assist your needs during cyber security simulation, by using this version you will be able to audit a targeted Windows operation system for system vulnerabilities, misconfiguration, and privilege escalation attacks and replicate the tactics and techniques of an advanced adversary in a network. With node js support for web application API, it becomes much easier for installation and customization in a timely manner, the windows sensor agent will...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    peda

    peda

    Python Exploit Development Assistance for GDB

    Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    LaPath

    Learning Automata algorithm for the shortest path problem.

    ...Learning Automata (LA) are adaptive mechanisms requiring feedback from the executing environment to converge to certain states. In the context of network routing, LA residing at intermediate nodes along a path, exploit feedback from the destination node for reducing, e.g., path's length. According to topology’s resources like the node and edge numbers, the proper number of iterations must be used. More iterations lead to paths with higher probability of being optimal but more computing resources are consumed. Development takes place at https://github.com/zfoxer/LaPath
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    ATSCAN SCANNER

    ATSCAN SCANNER

    Advanced dork Search & Mass Exploit Scanner

    Advanced Mass Search / Dork / Exploitation Scanner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    GroovyLab

    GroovyLab

    GroovyLab: Effective MATLAB-like scientific programming in Groovy

    ...The GroovyLab user can work either with a MATLAB-like command console, or with a flexible editor based on the rsyntaxarea (http://fifesoft.com/rsyntaxtextarea/) component, that offers more convenient code development. GroovyLab supports extensive plotting facilities and can exploit effectively a lot of powerful Java scientific libraries, as JLAPACK , Apache Common Maths , EJML , MTJ , NUMAL translation to Java , Numerical Recipes Java translation , Colt etc. Also, GroovyLab supports Computer Algebra based on the symja (http://code.google.com/p/symja/) project. GiHub site: https://github.com/sterglee/jlabgroovy
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB