This repository serves as a centralized collection of custom Metasploit modules, proof-of-concept (PoC) exploits, and offensive security tools I have developed. It is maintained for ethical hacking demonstrations. Mostly, You can use the expoits using the Metasploit Framework.
Please Read Before Using:
The code and techniques provided in this repository are created for ethical hacking purposes only.
- Authorization: Do not use these exploits on systems you do not own or do not have explicit permission to test.
- Liability: The author is not responsible for any damage, data loss, or legal consequences resulting from the misuse of this information.
- Intent: These tools are intended to help security professionals and researchers understand vulnerabilities to better secure systems.
Amirhossein Ahmadnejad Roudsari
I am an Offensive Security Engineer and AI & Cybersecurity Researcher with a focus on red teaming, pentesting, and malware development. Currently, I am a Master's student in Computer Science (Cybersecurity) at York University.
My work often involves building offensive frameworks and tools to simulate realistic attacks. Some of my other projects include FYODOST (Layer 2 offensive arsenal) and MalWests (malware development research). I am also an active bug hunter on platforms like HackerOne and Bugcrowd.
- Focus: Network Security, AI/ML Security, Exploit Development
- Location: Canada
- LinkedIn: in/aahmadnejad
To use these exploits, you must load them into the Metasploit Framework.
- Clone the repository:
git clone [https://github.com/aahmadnejad/myExploits.git](https://github.com/aahmadnejad/myExploits.git)
- Clone the repository: You can copy the modules to your local Metasploit directory (usually ~/.msf4/modules/) or simply point Metasploit to this directory.
# Example: Copying a specific category to your local MSF directory
mkdir -p ~/.msf4/modules/exploits/linux/http/
cp myExploits/CVE-2025-55182-React-Next/CVE-2025-55182.rb ~/.msf4/modules/exploits/linux/http/I'll add the usage of each exploit in it's own folder as a readme file
