Automation library for Metasploit
☆407Jul 15, 2025Updated 7 months ago
Alternatives and similar repositories for pymetasploit3
Users that are interested in pymetasploit3 are comparing it to the libraries listed below
Sorting:
- A full-fledged msfrpc library for Metasploit framework.☆301Aug 31, 2021Updated 4 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Dec 8, 2022Updated 3 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- Prints the IPs on your local network that're sending the most packets☆153Jul 20, 2021Updated 4 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Apr 30, 2019Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Responder for Python3☆99Aug 15, 2019Updated 6 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Process Injection☆766Oct 24, 2021Updated 4 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆87Apr 8, 2025Updated 11 months ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆277Apr 16, 2020Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Apr 6, 2021Updated 4 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,323Dec 6, 2023Updated 2 years ago
- metasploitHelper☆253Apr 3, 2020Updated 5 years ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆407Nov 14, 2022Updated 3 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆385Dec 13, 2020Updated 5 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,529Jun 30, 2023Updated 2 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Some of my exploits.☆600Feb 25, 2021Updated 5 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Payload Generation Framework☆1,971Aug 21, 2024Updated last year
- Rapid Attack Infrastructure (RAI)☆310Nov 24, 2024Updated last year
- A modular C2 framework☆509Feb 28, 2026Updated last week
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,901Jan 24, 2024Updated 2 years ago
- CVE-2018-2628☆20Apr 18, 2018Updated 7 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Stealthy backdoor for Windows operating systems☆283Feb 13, 2020Updated 6 years ago
- for mass exploiting☆615Jul 14, 2022Updated 3 years ago
- Declarative penetration testing orchestration framework☆295Dec 20, 2019Updated 6 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago