Home Tools


The latest hacking and hacker tools. Open source offensive and defensive security tools. Browse interactive maps of offensive security tools used by malicious actors and cybercriminals. Check out some live threat maps and malware intelligence databases.

This will be a curated list of mostly open source hacking tools. These can range from Red Teaming offensive security tools to fuzzers and debuggers for malware analysis. We are always looking for new state of the art tools that can be used for security professionals. Please feel free to send us a tool via email or one of our social media accounts.

Packet Storm New Exploits For January, 2023

Authored by Todd J. | Site packetstormsecurity.com This archive contains all of the 130 exploits added to Packet Storm in January, 2023.

Oracle Database Spatial Component Privilege Escalation

Authored by Emad Al-Mousa Oracle Database version suffers from a privilege escalation vulnerability that achieves DBA access via the Spatial component. Change Mirror Download Title: Oracle Database Privilege Escalation Through Oracle...

F5 Big-IP Create Administrative User

Authored by Ron Bowes | Site metasploit.com This Metasploit module creates a local user with a username/password and root-level privileges. Note that a root-level account is not required to do...

macOS Dirty Cow Arbitrary File Write Local Privilege Escalation

Authored by timwr, Ian Beer, Zhuowei Zhang | Site metasploit.com Dirty Cow arbitrary file write local privilege escalation exploit for macOS. advisories | CVE-2022-46689 Change Mirror Download ### This module requires Metasploit: https://metasploit.com/download#...

Lenovo Diagnostics Driver Memory Access

Authored by jheysel-r7, alfarom256 | Site metasploit.com This Metasploit module demonstrates how an incorrect access control for the Lenovo Diagnostics Driver allows a low-privileged user the ability to issue device...

Windows Kernel Registry Virtualization Memory Corruption

Authored by Google Security Research, mjurczyk Microsoft Windows suffers from a kernel memory corruption due to an insufficient handling of predefined keys in registry virtualization. advisories | CVE-2023-21675

Android Binder VMA Management Security Issues

Authored by Jann Horn, Google Security Research Android Binder VMA management suffers from multiple security issues. advisories | CVE-2023-20928

Apache Tomcat On Ubuntu Log Init Privilege Escalation

Authored by h00die, Dawid Golunski | Site metasploit.com This Metasploit module targets a vulnerability in Tomcat versions 6, 7, and 8 on Debian-based distributions where these older versions provide a...

Online Eyewear Shop 1.0 SQL Injection

Authored by Muhammad Navaid Zafar Ansari Online Eyewear Shop version 1.0 suffers from a remote SQL injection vulnerability. Change Mirror Download # Exploit Title: Online Eyewear Shop 1.0 - Product detail 'id'...

eCommerce Marketplace Platform CMS 1.7 Cross Site Scripting

Authored by CraCkEr eCommerce Marketplace Platform CMS version 1.7 suffers from a cross site scripting vulnerability. Change Mirror Download ┌┌───────────────────────────────────────────────────────────────────────────────────────┐││ ...
Error decoding the Instagram API json