DanMcInerney / metasploit-frameworkLinks
Metasploit Framework
☆11Updated 6 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14Updated 6 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- Information gathering tool - OSINT☆38Updated 6 years ago
- wifi attacks suite☆60Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆82Updated 5 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆34Updated 7 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- A simple script to generate a hidden url for social engineering.☆121Updated 5 years ago
- A very flexible phone number wordlist generator☆69Updated last year
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- Bramble is a hacking Open source suite.☆84Updated 5 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆35Updated 4 years ago
- website admin panel finder☆34Updated 4 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- An automated Wireless RogueAP MITM attack framework.☆185Updated 6 years ago
- Advance Google Dorker and Vulnerability Scanner☆48Updated 6 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆137Updated 5 years ago
- ☆109Updated 2 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 4 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆90Updated 6 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆185Updated 4 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated 2 years ago
- A tool to harvest credentials from leaked data dump☆75Updated 3 years ago