Intek13x / armitageLinks
Rewriting Armitage in Kotlin for the latest Metasploit
☆16Updated 2 years ago
Alternatives and similar repositories for armitage
Users that are interested in armitage are comparing it to the libraries listed below
Sorting:
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Updated 5 years ago
- ☆28Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Updated last year
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Custom pentesting tools☆26Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Updated 6 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 4 years ago
- Basic Dart reverse shell code☆21Updated 2 years ago
- JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.☆65Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- SMTP Open Relay Exploitation☆16Updated 5 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆23Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 5 years ago
- Use md5-collisions to make evil executables looking like a good one.☆34Updated 5 years ago
- Left To My Own Devices - NT hash tools☆40Updated 3 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆29Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago
- A powerful reverse shell generator☆46Updated 3 years ago
- Burp Suite plugin that dynamically generates Google 2FA codes for use in session handling rules (approved by PortSwigger for inclusion in…☆29Updated 5 months ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago