Exploit-install / ExploitOnCLI
Trying to be the best tool to search for exploits in the terminal.
☆11Updated 7 years ago
Related projects: ⓘ
- AIL framework - Analysis Information Leak framework☆8Updated 6 years ago
- SPIZZLE, The Onion Spider.☆13Updated 6 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆19Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- SIP hacking tools and scripts☆23Updated 3 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆12Updated 6 years ago
- All xxx-arsenal repos in one☆14Updated 5 years ago
- Various exploits☆10Updated 7 years ago
- All your layer are belong to us☆18Updated 10 years ago
- A full-fledged msfrpc library for Metasploit framework.☆11Updated 7 years ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆12Updated 2 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 6 years ago
- Auto Web Vulnerability Scanning Framework☆11Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Tools and scripts dedicated to Android application security☆48Updated 3 years ago
- python tools to assist in penetration testing☆14Updated 2 months ago
- Bypass XSS Reflected Cross-site scripting☆29Updated 8 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 5 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated 2 years ago
- PHP Phishing Framework☆27Updated 10 years ago
- Software exploitation training material☆14Updated 7 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 2 months ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆13Updated 6 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 9 years ago
- Example packet.proxy plugins.☆21Updated 3 years ago