Skip to content
#

exploitation

Here are 35 public repositories matching this topic...

A powerful, automated script that installs and configures 300+ offensive security tools across 20+ categories (recon, exploitation, post-exploitation, red teaming, etc.). Features parallel installations, GitHub API integration, dependency management, and isolated Python environments for clean tool setups.

  • Updated Apr 24, 2025
  • Shell

FaultLine is a personal hacking toolkit I’ve been building to help with everything from network recon to exploitation and post-exploitation. It started as a way to make my own bug bounty hunting and red team work faster and more efficient. It's not perfect and still a work in progress.

  • Updated Apr 18, 2025
  • Shell

Rogue.sh is an automated Bash script for Linux systems that performs Nmap scans, sets up Metasploit, exploits vulnerabilities, downloads sensitive files, gathers credentials, and executes post-exploitation tasks, providing a comprehensive overview of a target system's vulnerabilities and security measures.

  • Updated Aug 20, 2025
  • Shell

Improve this page

Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."

Learn more