0x90 / mitmf-examples
Basic examples for MITMf
☆16Updated 9 years ago
Alternatives and similar repositories for mitmf-examples:
Users that are interested in mitmf-examples are comparing it to the libraries listed below
- A web interface for Hashcat/oclHashcat☆28Updated 8 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- ☆42Updated 10 years ago
- Automatically performs the SMB relay attack☆72Updated 8 years ago
- Scripts that aren't PowerShell☆47Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 11 years ago
- ☆34Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Easy Window domain access☆51Updated 11 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆69Updated 10 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 10 years ago
- Code released with Shmoocon Firetalks and Epilogue talks☆44Updated 9 years ago
- SQL SERVER Exploitation.☆27Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 11 months ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago