Python3 Metasploit automation library
☆24Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for pymetasploit3
Users that are interested in pymetasploit3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 4 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- 主要是收集自己编写、改造的一些小的脚本:ip-reverse-to-domain| findSubDomains| Shodan| ZoomEye| Censys|ecshop|vul-info-collect|cve_for_today|telnet☆37Oct 15, 2021Updated 4 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- ☆16Jul 19, 2017Updated 8 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆16Aug 19, 2024Updated last year
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- A Golang implant that uses Slack as a command and control server☆47Jun 10, 2020Updated 5 years ago
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- ☆17Apr 21, 2017Updated 8 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67May 9, 2022Updated 3 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- Extension of SMBLibrary for RPC calls☆35Jun 11, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆17Jan 28, 2020Updated 6 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- CVE-2019-0708 (BlueKeep)☆111Jul 7, 2020Updated 5 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago