Skip to content
#

vulnerability-exploitation

Here are 3 public repositories matching this topic...

Language: All
Filter by language

Jie stands out as a comprehensive security assessment and exploitation tool meticulously crafted for web applications. Its robust suite of features encompasses vulnerability scanning, information gathering, and exploitation, elevating it to an indispensable toolkit for both security professionals and penetration testers. 挖洞辅助工具(漏洞扫描、信息收集)

  • Updated Jul 5, 2024
  • Go

This repository provides easy-to-follow methods for gaining admin rights (privilege escalation) on Windows 10, 11, and newer systems. Learn how to identify and exploit misconfigurations, weak permissions, and common security flaws to escalate user privileges. Perfect for ethical hackers, penetration testers, and security researchers looking to test

  • Updated Oct 22, 2024
  • HTML

This project demonstrates ARP Poisoning, a Man-in-the-Middle (MITM) attack, using Kali Linux and Windows 11. Tools like Wireshark and Ettercap were employed to intercept network traffic and exploit vulnerabilities, highlighting the risks of data theft and unauthorized access.

  • Updated Sep 19, 2024

Improve this page

Add a description, image, and links to the vulnerability-exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vulnerability-exploitation topic, visit your repo's landing page and select "manage topics."

Learn more