Intek13x / armitageLinks
Rewriting Armitage in Kotlin for the latest Metasploit
☆17Updated 2 years ago
Alternatives and similar repositories for armitage
Users that are interested in armitage are comparing it to the libraries listed below
Sorting:
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 6 years ago
- Linux Persistence Toolkit☆71Updated 3 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Updated 5 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆23Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆14Updated 6 years ago
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- Left To My Own Devices - NT hash tools☆41Updated 3 years ago
- Custom pentesting tools☆25Updated 5 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆22Updated 3 years ago
- Use md5-collisions to make evil executables looking like a good one.☆33Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Updated last year
- Write-Ups for TryHackMe☆24Updated 4 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 4 years ago
- ☆27Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated last year
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- The largest collection of wordlists in yaml for bug bounty tools☆37Updated last year
- Custom Metasploit logos☆54Updated 4 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 7 months ago
- Basic Dart reverse shell code☆21Updated 2 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆14Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated 6 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆29Updated 2 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago