{"id":21845254,"url":"https://github.com/entysec/hatsploit","last_synced_at":"2025-05-16T10:08:26.187Z","repository":{"id":38377436,"uuid":"339773808","full_name":"EntySec/HatSploit","owner":"EntySec","description":"Modular penetration testing platform that enables you to write, test, and execute exploit code.","archived":false,"fork":false,"pushed_at":"2024-12-01T17:25:09.000Z","size":8594,"stargazers_count":304,"open_issues_count":0,"forks_count":67,"subscribers_count":10,"default_branch":"main","last_synced_at":"2025-04-09T06:04:58.153Z","etag":null,"topics":["android","entysec","exploit","exploit-database","exploit-development","exploitation","exploitation-framework","exploits","hacking-tool","infosec","payload","post-exploitation","privilege-escalation","python","remote-access-tool","remote-control","security","windows","windows-hacking"],"latest_commit_sha":null,"homepage":"https://hatsploit.com","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EntySec.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"github":"entysec"}},"created_at":"2021-02-17T15:48:48.000Z","updated_at":"2025-04-09T04:40:49.000Z","dependencies_parsed_at":"2022-08-26T10:21:25.795Z","dependency_job_id":"d7735cc2-fcc7-4cac-872a-71489bba37e7","html_url":"https://github.com/EntySec/HatSploit","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EntySec%2FHatSploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EntySec%2FHatSploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EntySec%2FHatSploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EntySec%2FHatSploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EntySec","download_url":"https://codeload.github.com/EntySec/HatSploit/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254509477,"owners_count":22082892,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["android","entysec","exploit","exploit-database","exploit-development","exploitation","exploitation-framework","exploits","hacking-tool","infosec","payload","post-exploitation","privilege-escalation","python","remote-access-tool","remote-control","security","windows","windows-hacking"],"created_at":"2024-11-27T23:08:46.845Z","updated_at":"2025-05-16T10:08:21.177Z","avatar_url":"https://github.com/EntySec.png","language":"Python","readme":"\u003ch3 align=\"center\"\u003e\n    \u003cimg src=\"https://hatsploit.com/images/logo-footer.png\" alt=\"logo\" height=\"250px\"\u003e\n\u003c/h3\u003e\n\n\u003cp align=\"center\"\u003e\n    \u003cb\u003eHatSploit Framework\u003c/b\u003e\n    \u003cbr\u003e\n    \u003cbr\u003e\n    \u003ca href=\"https://entysec.com\"\u003e\n        \u003cimg src=\"https://img.shields.io/badge/developer-EntySec-blue.svg\"\u003e\n    \u003c/a\u003e\n    \u003ca href=\"https://github.com/EntySec/HatSploit\"\u003e\n        \u003cimg src=\"https://img.shields.io/badge/language-Python-blue.svg\"\u003e\n    \u003c/a\u003e\n    \u003ca href=\"https://github.com/EntySec/HatSploit/forks\"\u003e\n        \u003cimg src=\"https://img.shields.io/github/forks/EntySec/HatSploit?style=flat\u0026color=green\"\u003e\n    \u003c/a\u003e\n    \u003ca href=\"https://github.com/EntySec/HatSploit/stargazers\"\u003e\n        \u003cimg src=\"https://img.shields.io/github/stars/EntySec/HatSploit?style=flat\u0026color=yellow\"\u003e\n    \u003c/a\u003e\n    \u003ca href=\"https://www.codefactor.io/repository/github/entysec/hatsploit\"\u003e\n        \u003cimg src=\"https://www.codefactor.io/repository/github/entysec/hatsploit/badge\"\u003e\n    \u003c/a\u003e\n    \u003cbr\u003e\n    \u003cbr\u003e\n    Modular penetration testing platform that \n    \u003cbr\u003eenables you to write, test, and execute exploit code.\n    \u003cbr\u003e\n    \u003cp align=\"center\"\u003e\u003ca href=\"https://hatsploit.com\"\u003eAbout HatSploit\u003c/a\u003e | \u003ca href=\"https://docs.hatsploit.com/docs/getting-started/installation.html\"\u003eInstallation\u003c/a\u003e | \u003ca href=\"https://docs.hatsploit.com/docs/getting-started/using-hatsploit.html\"\u003eUsing HatSploit\u003c/a\u003e\u003cp\u003e\n\u003c/p\u003e\n","funding_links":["https://github.com/sponsors/entysec"],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fentysec%2Fhatsploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fentysec%2Fhatsploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fentysec%2Fhatsploit/lists"}