Metasploit Framework
☆11Apr 18, 2019Updated 6 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 6 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Feb 26, 2018Updated 8 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 8 years ago
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Prints the IPs on your local network that're sending the most packets☆152Jul 20, 2021Updated 4 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- Does some google dorks against a domain☆166Jan 20, 2020Updated 6 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- Scrape google search results☆94Aug 24, 2018Updated 7 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- Find wifi channel with least interference☆54Jul 21, 2019Updated 6 years ago
- Crawler for http://ufcstats.com/☆25May 14, 2024Updated last year
- Automation library for Metasploit☆407Jul 15, 2025Updated 7 months ago
- 📑 A minimalist Android todo app based on Clean Architecture with MVP (for the presentation layer) using architecture components library …☆10Apr 22, 2020Updated 5 years ago
- New Honeypot Version: 1.2! This pH7CMS module is a simple but effective honeypot fake Admin CP for the security of your website. Honey…☆12Aug 3, 2018Updated 7 years ago
- html5 port of earf (software terrain renderer)☆21Feb 21, 2014Updated 12 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- A simple example of using Tile38 to track the ISS and send notifications when it's overhead.☆10Sep 4, 2018Updated 7 years ago
- Benchmarks to compare golang geohash implementations☆12Aug 6, 2018Updated 7 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 8 years ago
- Select parts of my homegrown library for Android app development☆12Aug 2, 2022Updated 3 years ago
- Advance Google Dorker and Vulnerability Scanner☆50Oct 29, 2018Updated 7 years ago
- Clear examples, explanations, and resources for React v.16.6.x (React Hooks)☆11Jan 15, 2019Updated 7 years ago
- Monitoring plugin to check the Status of a MySQL/MariaDB replication slave☆15Jul 24, 2023Updated 2 years ago
- A catalog of cursors and icons from Windows 98, in original and modern formats☆16Jun 25, 2024Updated last year
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- TikTok Scraper & Downloader. Scrape information from User, Trending and HashTag pages and download video posts☆13Oct 23, 2019Updated 6 years ago
- Use Python Selenium For GUI Automation Test☆12Jul 11, 2018Updated 7 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Faraday middleware to support bitcoin lightning paywalls. (pay per request)☆10Jun 2, 2019Updated 6 years ago