Skip to content

This repository serves as a centralized collection of custom exploits, proof-of-concept (PoC) code, and offensive security tools I have developed. It is maintained for ethical hacking demonstrations.

Notifications You must be signed in to change notification settings

aahmadnejad/exploitest

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Exploitest

Metasploit Red Team Ruby Python

exploitest Icon

This repository serves as a centralized collection of custom Metasploit modules, proof-of-concept (PoC) exploits, and offensive security tools I have developed. It is maintained for ethical hacking demonstrations. Mostly, You can use the expoits using the Metasploit Framework.

⚠️ Disclaimer

Please Read Before Using:

The code and techniques provided in this repository are created for ethical hacking purposes only.

  • Authorization: Do not use these exploits on systems you do not own or do not have explicit permission to test.
  • Liability: The author is not responsible for any damage, data loss, or legal consequences resulting from the misuse of this information.
  • Intent: These tools are intended to help security professionals and researchers understand vulnerabilities to better secure systems.

👨‍💻 About Me

Amirhossein Ahmadnejad Roudsari

I am an Offensive Security Engineer and AI & Cybersecurity Researcher with a focus on red teaming, pentesting, and malware development. Currently, I am a Master's student in Computer Science (Cybersecurity) at York University.

My work often involves building offensive frameworks and tools to simulate realistic attacks. Some of my other projects include FYODOST (Layer 2 offensive arsenal) and MalWests (malware development research). I am also an active bug hunter on platforms like HackerOne and Bugcrowd.

  • Focus: Network Security, AI/ML Security, Exploit Development
  • Location: Canada
  • LinkedIn: in/aahmadnejad

📥 Installation

To use these exploits, you must load them into the Metasploit Framework.

  1. Clone the repository:
    git clone [https://github.com/aahmadnejad/myExploits.git](https://github.com/aahmadnejad/myExploits.git)
    
  2. Clone the repository: You can copy the modules to your local Metasploit directory (usually ~/.msf4/modules/) or simply point Metasploit to this directory.
# Example: Copying a specific category to your local MSF directory
mkdir -p ~/.msf4/modules/exploits/linux/http/
cp myExploits/CVE-2025-55182-React-Next/CVE-2025-55182.rb ~/.msf4/modules/exploits/linux/http/

🛠️ Usage

I'll add the usage of each exploit in it's own folder as a readme file

About

This repository serves as a centralized collection of custom exploits, proof-of-concept (PoC) code, and offensive security tools I have developed. It is maintained for ethical hacking demonstrations.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages