Manage the metasploit framework database
☆16Nov 8, 2020Updated 5 years ago
Alternatives and similar repositories for msfdb
Users that are interested in msfdb are comparing it to the libraries listed below
Sorting:
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Official BlackArch Linux PKGBUILD templates.☆33Feb 2, 2026Updated last month
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- BlackArch menu, theme, and config for Fluxbox.☆17Mar 14, 2023Updated 2 years ago
- ☆15Jul 9, 2020Updated 5 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- Blazing-fast-cross-platform-monkey-patch-free string XOR☆37Sep 7, 2024Updated last year
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆18Sep 6, 2024Updated last year
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Open-source advanced cracking tool made in Electron.JS☆19Jul 7, 2020Updated 5 years ago
- OWASp PureCaptcha project☆25Dec 15, 2019Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- An OSINT tool to search for accounts by username in social networks.☆19Aug 8, 2022Updated 3 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- Hybrid client emulator (python and C++) for Metin2.☆19Oct 14, 2016Updated 9 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24May 29, 2018Updated 7 years ago
- ☆27Feb 3, 2026Updated 3 weeks ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- BlackArch Linux Slim ISO☆22Jun 30, 2018Updated 7 years ago
- 😈 The Demon App Store☆30Aug 18, 2021Updated 4 years ago
- Bypassing Android Pattern Lock☆69Apr 16, 2014Updated 11 years ago
- Fetch, install and search exploit archives from exploit sites.☆118Oct 10, 2023Updated 2 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- ☆70Nov 4, 2021Updated 4 years ago
- BlackArch menu, theme, and config for AwesomeWM.☆30Mar 14, 2023Updated 2 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆202Feb 25, 2024Updated 2 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Jul 3, 2024Updated last year
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Jun 28, 2022Updated 3 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Jul 6, 2013Updated 12 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago