DanMcInerney / metasploit-frameworkLinks
Metasploit Framework
☆11Updated 6 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14Updated 6 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆84Updated 5 years ago
- Information gathering tool - OSINT☆38Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆35Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Updated 7 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆27Updated 8 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- wifi attacks suite☆60Updated 5 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Updated 6 years ago
- Bramble is a hacking Open source suite.☆85Updated 5 years ago
- A simple script to generate a hidden url for social engineering.☆121Updated 5 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆17Updated 4 years ago
- Simple Backdoor Manager with Python (based on weevely)☆95Updated 7 months ago
- Google Hack Database dork automatic tool.☆25Updated 7 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Wi-Fi Exploit Tool☆51Updated 5 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Updated 6 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Updated 6 years ago
- Hacking Tools Z0172CK☆31Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆147Updated this week
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆34Updated 7 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆90Updated 6 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆45Updated 9 years ago