DanMcInerney / msf-autopwnView external linksLinks
Autoexploitation of some of the most common vulnerabilities in wild
☆124Jun 22, 2018Updated 7 years ago
Alternatives and similar repositories for msf-autopwn
Users that are interested in msf-autopwn are comparing it to the libraries listed below
Sorting:
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 7 years ago
- CVE-2018-2628☆20Apr 18, 2018Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- How To Execute Shellcode via HTA☆141Feb 23, 2018Updated 7 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Aug 4, 2020Updated 5 years ago
- Automation library for Metasploit☆407Jul 15, 2025Updated 7 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Nov 3, 2018Updated 7 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Feb 7, 2018Updated 8 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- CVE-2018-7600 Drupal RCE☆114Apr 18, 2018Updated 7 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆292Feb 28, 2018Updated 7 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆168May 23, 2018Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆444Nov 30, 2023Updated 2 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Apr 29, 2018Updated 7 years ago
- kernel privilege escalation enumeration and exploitation framework☆700Aug 2, 2018Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 6 months ago