LionSec / xerosploit
Efficient and advanced man in the middle framework
☆2,079Updated last year
Alternatives and similar repositories for xerosploit:
Users that are interested in xerosploit are comparing it to the libraries listed below
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,115Updated 4 years ago
- Automatically brute force all services running on a target.☆2,037Updated 6 months ago
- Python Remote Administration Tool (RAT)☆3,213Updated last year
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,135Updated 4 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,039Updated 2 years ago
- Network Attack Tool☆1,456Updated last year
- Websploit is a high level MITM framework☆1,175Updated last year
- Framework for Man-In-The-Middle attacks☆3,597Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,055Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,247Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆732Updated 4 years ago
- Undetectable Windows Payload Generation☆1,578Updated 2 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,486Updated last year
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆909Updated 5 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,093Updated this week
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,266Updated 5 months ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,280Updated 9 months ago
- Striker is an offensive information and vulnerability scanner.☆2,254Updated last year
- Powerful framework for rogue access point attack.☆2,085Updated last year
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,399Updated 6 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,194Updated 7 months ago
- Phishing Campaign Toolkit☆2,345Updated 7 months ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,179Updated 7 years ago
- ☆973Updated 2 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,451Updated 6 months ago
- Find exploits in local and online databases instantly☆1,697Updated 3 years ago
- venom - C2 shellcode generator/compiler/handler☆1,829Updated last year
- Common User Passwords Profiler (CUPP)☆4,653Updated last year
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,309Updated 4 years ago
- Python antivirus evasion tool☆1,402Updated last year