Showing 147 open source projects for "exploit"

View related business solutions
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    To exploit all available information from the family structure we developed CATCH, an algorithm that combines genotyped SNPs of all family members for the optimal detection of Runs Of Homozygosity (ROH) and exome sequencing data from one affected individual to identify putative causative variants in consanguineous families. CATCH proved to be effective in discovering known or putative new causative variants in
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Metasploit Framework

    Metasploit Framework

    Metasploit Framework

    Metasploit Framework is a comprehensive penetration-testing and exploit development platform that streamlines the process of discovering, validating, and demonstrating vulnerabilities. It provides a modular architecture—payloads, encoders, exploits, auxiliaries, and post-exploitation modules—so security professionals can piece together complex attack chains or test defensive controls in realistic ways.
    Downloads: 39 This Week
    Last Update:
    See Project
  • 3
    PowerSploit PowerShell

    PowerSploit PowerShell

    A PowerShell Post-Exploitation Framework

    ...The repository bundles many focused scripts: code to enumerate system and Active Directory information, payload generation helpers, in-memory execution utilities, and modules to interact with credentials and services. Because the modules can be used to both demonstrate weaknesses and to exploit them, the project is typically referenced in threat emulation, penetration testing, and defensive research to understand attacker capabilities. Responsible use centers on authorized assessments: defenders use the toolkit to validate monitoring and detection, while operators apply its lessons to patch, harden, and instrument systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Tattle Trail

    PHP 404 pages to trap malicious web requests and report abusers

    ...Most network operators provide abuse contact email addresses in their WHOIS information, and your webserver can immediately report malicious access attempts as they happen. A large amount of bots that sniff around websites for unsecured standard web apps (like phpMyAdmin or WordPress) to exploit are run by a very few bad actors. They're easy to catch by watching for attempted visits to pages that don't exist (usually with admin or db in the path). The more these bad robots get reported (and shut down by their ISPs), the more time they have to spend looking for new hosts instead of new websites they can hack into.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    shell hunter

    shell hunter

    this is a small utility to find shells in your web server

    This is a small software to scan your webserver for shells and perform penetration tests, you provide a link and it will be scanned against known shells , this list has 1000+ shells variations , if you have any suggestion i will be happy to add them , Made by Mukkov
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    CUDA-Quicksort

    CUDA-Quicksort: A GPU-based implementation of the quicksort algorithm

    CUDA-quicksort is a GPU-based implementation of the quicksort algorithm. CUDA-quicksort is designed to exploit the power computing of modern NVIDIA GPUs. "Two GPU-based implementations of the quicksort were presented in literature: the GPU-quicksort, a compute-unified device architecture (CUDA) iterative implementation, and the CUDA dynamic parallel (CDP) quicksort, a recursive implementation provided by NVIDIA Corporation."[*]. CUDA-quicksort is an iterative GPU-based implementation of the quicksort algorithm. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    xxe

    Intentionally vulnerable web services exploitable with XXE

    ...This attack may lead to the disclosure of confidential data, denial of service, port scanning from the perspective of the machine where the parser is located. This zipped Ubuntu VM is set up as a Capture the Flag with those that successfully exploit the XXE vulnerability able to place their name on a leaderboard. As with other challenges in the OWASP Vicnum project the overall purpose is to have fun and generate interest in the topic. This challenge was used in an OWASP APPSEC 'Breaking Bad' event.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    mapgraph

    mapgraph

    Massively Parallel Graph processing on GPUs -- now part of Blazegraph

    Mapgraph is SYSTAP’s disruptive new technology to exploit the main memory bandwidth advantages of GPUs. The early work was co-developed with the University of Utah SCI Institute and has its pedigree in the UINTAH software running on over 750M cores on the TITAN Super Computer. Today, SYSTAP has commercialized this technology into it’s Blazegraph Accelerator and Blazegraph HPC products.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ...It allows to send mails to a single recipient or a list, it supports plain text/html email formats, attachments, templates and more... Update Version 1.1: =============== * Added text conversion to Homographs for bypassing spam filters. (based on http://www.exploit-db.com/wp-content/themes/exploit/docs/20114.pdf) * Added Reply-To header * Added Sender Name Field * Added Built in User Agent * Detailed error log If you find this tool useful crypto currency donations are welcome: Bitcoin: 1Kksc9b4WZ5X36xGDgpodPVpBSozMje6ui Litecoin: LQ1JCMxo122FpJ8iKX7HsrNtjCacpTkkFW
    Downloads: 4 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    Intel(R) CnC

    Intel(R) CnC

    Parallelism without the Pain

    CnC makes it easy to write C++ programs which take full advantage of the available parallelism. Whether run on multicore systems, Xeon Phi™ or clusters CnC will seamlessly exploit the performance potential of your hardware. Through its portabilty and composability (with itself and other tools) it provides future-proof scalability. Intel© Concurrent Collections for C++ is a C++ template library for letting C++ programmers implement CnC applications which run in parallel on shared and distributed memory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    GHDB 3953 html
    Google Hacking-Database 1-3953, html format. Google Dorks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Java Exploit For Openssl Heartbleed Bug

    Client exploit for openssl heartbleed bug written in Java

    This is a Java client program that is used to exploit the openssl heartbleed bug. It is based on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org). Just run the program as: java -cp "." JavaHeartBleed <host> <port> Example, java -cp "." JavaHeartBleed localhost 443. You are free to distribute and modify the program as per your requirement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Lente

    Lente

    Looking for Equal or Near Text Efficiently

    Lente is a plagiarism checker. You can add txt or pdf files to search for documents on the internet with matching information. The program will provide, as a result, a list of URLs with possible plagiarisms, indicating the matches found for each web page. If you need additional support, contact us at lente.dev@gmail.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Milw0rm Wordpress
    Description: Theme its inspired by Milw0rm Exploit Database, now we are glad to introduce to you another version of that awsome looking that you can use it on WordPress.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Command-Injection-ISO

    Command-Injection-ISO

    Real World Command Injection Vulnerable Apps

    We've packaged 10 real world applications into an Ubuntu Desktop based ISO. These applications are vulnerable to command injection attacks which you will need to find and exploit. Please note that not all applications are on port 80 :) All the best!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Sandi

    Sandi

    Sandi Exploit Search Engine

    Sandi and open source project for search the exploits from exploit databases ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    BHS Debian (Hades Update)

    BHS Debian (Hades Update)

    BHS debian (testing) jessie/sid

    BHS (Debian) New BHS release Based on Debian jessie/sid Kermel 3.12 KDE 4.11 Debian style and look Custom scripts!! Defcon tools!! New wifi scripts Multiarch support Top tools username: root password: BHS note: Don't forget to run the script located on the desktop to install the missing tools,because without to run it the menu will not be functional,if you not see it just download from here in the file section..sorry for the delay the upload stack for 2...
    Downloads: 52 This Week
    Last Update:
    See Project
  • 19
    ByteBit is a project that uses VB.NET as main language for Emulating Assembly for education purposes only. Also, ByteBit project has the "Exploit Sender" created in vb.net for only education purposes. ByteBit VASM Emulator - Is an very basic assembly emulator, in beta phase. ByteBit Exploit Sender - Is a simple application that send specific buff in order to explore vulns.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    MadScan

    Joomla & Wordpress Exploit Scanner

    ...After finish the scan it will give you a popup about result. Now you have to click on Save Report . Now copy the exploitable link .. and search in google For a better tut visit http://www.madleets.com/Thread-MAD-SCAN-Exploit-Scanner-Beta
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Umbrella Project 2012

    Security (Hack) Application

    ...Deface Mass Saver a) Zone-h deface saver b) IMT deface saver 4. MD5 Hash Cracker a) Online MD5 Hash Cracker (49 Sites) b) Manuel MD5 Hash Cracker 5. Admin Finder 6.Exploit Finder 7. Brute Force a) Joomla Brute Force b) WordPress Brute Force c) FTP Brute Force 8.Proxy a) Online proxy grabber b) Auto Clicker with proxy 9. Coding/Decoding a) Base 64 Code/Decode b) Md5 Creator c) Other Pass Creators 10.Other Tools a) Online File virus Scan b) Cloud Flare IP Resolver c) Manuel Script RFI Scanner d) Shell Control and more
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Esgix

    Esgix

    Pentest virtual machine

    ...From a last year project of Network System and Security Master's degree at the ESGI, ESGIX virtual machine has been created to provide a test environement to people who want to learn penetration testing. The main objective is to obtain root access on the virtual machine, using However you could have fun by finding security holes and intrusions techniques, and exploit them as you think best. The machine is freely available in the Download section. You can find a complete installation Wiki in the Documentation section. Enjoy White Hacking
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Stark

    explore, expand, exploit, and exterminate

    Wikipedia's Definition of a 4X Game; "4X games are a genre of strategy video game in which players control an empire and "explore, expand, exploit, and exterminate". The term was first coined by Alan Emrich in his September 1993 preview of Master of Orion for Computer Gaming World. Since then, others have adopted the term to describe games of similar scope and design. 4X games are noted for their deep, complex gameplay. Emphasis is placed upon economic and technological development, as well as a range of non-military routes to supremacy. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Mole

    Mole

    Automatic SQL Injection Exploitation Tool

    Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily. The CLI also provides auto-completion on both commands and command arguments, making the user type as less as possible.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25

    FlippingBitbot

    Vulnerable VM featuring Bitbot

    This is a Linux based VM that is intended as a way to get security researchers started with simple botnet research. It also requires the researcher have some ability to assess and exploit vulnerabilities, with the ultimate goal of obtaining root access to the VM. This is the second of many to come, please feel free to supply feedback so I can make future ones more enjoyable and fulfilling. The network configuration of the VM is set to auto, so it is easiest to run with some sort of DHCP server on the same network(or just select the NAT option in your virtualization software). ...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB