Cyb0r9 / ispyLinks
ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )
☆240Updated 4 years ago
Alternatives and similar repositories for ispy
Users that are interested in ispy are comparing it to the libraries listed below
Sorting:
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆208Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆124Updated 6 years ago
- A backdoor with a multitude of features.☆290Updated last year
- XCTR Hacking Tools☆38Updated 4 years ago
- Fud Payload generator script☆247Updated 6 years ago
- XSHOCK Shellshock Exploit☆87Updated 2 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Updated 6 years ago
- Simple python backdoor with Ngrok tunnel support☆206Updated last year
- Terminator metasploit payload generator☆180Updated 7 years ago
- B4TM4N ~ PHP WEBSHELL☆190Updated last year
- Installing Kali linux on Vps Server☆118Updated 6 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆225Updated last year
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆284Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆132Updated 5 years ago
- CMS auto detect and exploit.☆413Updated 3 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 6 years ago
- Hacking systems with the automation of PasteJacking attacks.☆400Updated 11 months ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆162Updated last year
- Social Engineering Tool☆190Updated 7 years ago
- ☆179Updated 2 years ago
- Automate Metasploit scanning and exploitation☆116Updated 2 months ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆90Updated 6 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆292Updated 7 years ago
- Brutal SSH: SSH Login brute force, scan for vulnerable version and 0 day exploit (under development)☆84Updated 2 years ago
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆149Updated 5 years ago
- An exploit for SHAREit <= v 4.0.38☆55Updated 6 years ago
- Automated brute-forcing attack tool.☆413Updated 4 years ago
- An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.☆273Updated 4 years ago
- metasploitHelper☆251Updated 5 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆447Updated 6 years ago