Skip to content
#

vulnerability-exploitation

Here are 2 public repositories matching this topic...

Jie stands out as a comprehensive security assessment and exploitation tool meticulously crafted for web applications. Its robust suite of features encompasses vulnerability scanning, information gathering, and exploitation, elevating it to an indispensable toolkit for both security professionals and penetration testers. 挖洞辅助工具(漏洞扫描、信息收集)

  • Updated Jul 5, 2024
  • Go

This project demonstrates ARP Poisoning, a Man-in-the-Middle (MITM) attack, using Kali Linux and Windows 11. Tools like Wireshark and Ettercap were employed to intercept network traffic and exploit vulnerabilities, highlighting the risks of data theft and unauthorized access.

  • Updated Sep 19, 2024

Improve this page

Add a description, image, and links to the vulnerability-exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vulnerability-exploitation topic, visit your repo's landing page and select "manage topics."

Learn more