DanMcInerney / metasploit-frameworkLinks
Metasploit Framework
☆11Updated 6 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14Updated 6 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Updated 7 years ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆86Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆55Updated 4 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆35Updated 4 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 7 years ago
- wifi attacks suite☆60Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆77Updated 2 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆27Updated 8 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Bramble is a hacking Open source suite.☆85Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.☆187Updated 6 years ago
- SQLi Google Dork Scanner☆59Updated 3 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆156Updated 3 weeks ago
- A very flexible phone number wordlist generator☆71Updated last year
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- It's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info.…☆57Updated 5 years ago
- Advance Google Dorker and Vulnerability Scanner☆49Updated 7 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 6 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆46Updated 10 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 3 years ago