This repository, openfire-exploit-suite, provides responsibly disclosed and open-sourced exploit tools for research, red teaming, and educational purposes. We are committed to maintaining the highest standards of ethical cybersecurity while ensuring responsible usage and publication of vulnerability-related tools.
- White Hat Alignment: This project aligns strictly with white-hat ethical hacking practices and aims to support defenders, researchers, and penetration testers.
- Zero Tolerance for Malicious Use: Any misuse of this repository for unauthorized intrusion or malicious activity is strictly condemned and against our values.
- Supported Environments: Testing is assumed to occur only in safe, air-gapped, lab, or explicitly authorized environments.
- Metasploit modules are written for controlled proof-of-concept (PoC) usage.
- Burp Suite extensions are designed with operator transparency and logging capabilities.
- No automated worm-like behavior or mass exploitation functionality will ever be added.
We follow coordinated vulnerability disclosure (CVD) principles. If you:
- Found a vulnerability in Openfire or our tools
- Want to report concerns about tool usage
Please contact us at: security@rag.fish (PGP key coming soon)
Security-related code contributions are:
- Subject to manual code review by maintainers
- Required to include unit/integration tests
- Evaluated for abuse potential before being merged
This suite helps defenders by:
- Simulating known exploits in safe conditions
- Aiding in building WAF rules, SIEM signatures, and mitigation patterns
- Promoting awareness of real-world exploitation techniques
- All code is released under the MIT License.
- Use is bound by local and international cybersecurity laws.
- We do not encourage or support illegal activity of any kind.
We stand on the shoulders of the infosec community. Inspired by:
- Rapid7 Metasploit Framework
- PortSwigger Burp Suite Ecosystem
- CVE research and Open Source Security initiatives
Found a bug, need help, or want to collaborate?
π§ security@rag.fish
π https://github.com/rag-fish/openfire-exploit-suite/discussions
βSecurity is not a product, but a process.β β Bruce Schneier