DanMcInerney / metasploit-framework
Metasploit Framework
☆11Updated 6 years ago
Alternatives and similar repositories for metasploit-framework:
Users that are interested in metasploit-framework are comparing it to the libraries listed below
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14Updated 6 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- E-mails, subdomains and names Harvester - OSINT☆14Updated 7 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- steal cookies from website using xss☆12Updated 5 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆80Updated 5 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 3 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Information gathering tool - OSINT☆35Updated 6 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆33Updated 3 years ago
- wifi attacks suite☆59Updated 4 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Updated 5 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 8 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 6 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆37Updated 4 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 6 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆30Updated 7 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Updated 5 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago