Josue87 / BoomER
Framework for exploiting local vulnerabilities
☆84Updated last year
Alternatives and similar repositories for BoomER:
Users that are interested in BoomER are comparing it to the libraries listed below
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆204Updated 5 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Updated 4 years ago
- best framework for information gathering ,pentesting and web aplication scanner☆9Updated 6 years ago
- Automated Tools Pentest☆7Updated last year
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆70Updated last year
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆64Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- Collect information about email addresses from Pastebin☆35Updated 3 years ago
- PowerShell Empire mod to post-exploit the World!☆135Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Automate Metasploit scanning and exploitation☆114Updated 4 months ago
- ☆79Updated last year
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆77Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Simple Karma Attack☆67Updated 4 years ago
- My collection of nmap nse modules☆63Updated 5 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 3 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- Python based script for Information Gathering.☆106Updated 8 months ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆61Updated 5 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆146Updated 6 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago