Metasploit Framework
☆19Apr 6, 2020Updated 5 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Jul 4, 2020Updated 5 years ago
- Metasploit Exploiting Tool For Linux☆21Sep 27, 2021Updated 4 years ago
- androrat☆22Nov 6, 2019Updated 6 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- ☆13Jan 17, 2025Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- Processing application to configure XBees☆17Jan 11, 2011Updated 15 years ago
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!☆14Aug 29, 2023Updated 2 years ago
- USB Rubber Ducky implemented on FeatherS2 boards (e.g. Lolin S2 Pico)☆12Nov 21, 2022Updated 3 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- TechTalk: Procesamiento masivo de datos con Go y sync.Pool☆12Jan 28, 2022Updated 4 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago