Matt-London / Install-Armitage-on-LinuxLinks
This is a program that will install Metasploit-Framework and Armitage on to any Debian-based Linux Distro (it can also be adapted to work on Mac). This was made possible using a combination of my own code, darkoperator's, and a nightly Metasploit installer from rapid7.
☆61Updated 3 years ago
Alternatives and similar repositories for Install-Armitage-on-Linux
Users that are interested in Install-Armitage-on-Linux are comparing it to the libraries listed below
Sorting:
- Python script to perform phishing attacks through captive portals, made for learning purposes☆52Updated 2 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆77Updated 2 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆61Updated 6 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆65Updated 4 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆87Updated 6 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆60Updated 3 years ago
- Simple script for the WHID injector - a rubberducky wifi☆108Updated 11 months ago
- This script will auto setup vncserver in Kali Linux Raspberry Pi 3 and Raspberry Pi Zero W for VNC session☆74Updated 5 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 8 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆48Updated 2 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆136Updated 5 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- gui tool to create normal payload by msfvenom☆34Updated 6 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆82Updated 6 months ago
- The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.…☆105Updated 5 years ago
- Small social engineering tool written in python2☆20Updated 8 months ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 5 years ago
- Hack Cameras CCTV FREE☆17Updated 3 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆47Updated 2 years ago
- this FUD Payload☆39Updated 3 years ago
- Find exploits in local and online database☆76Updated 9 months ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆206Updated 6 years ago
- Hacking Tools Z0172CK☆31Updated 2 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆51Updated 7 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Fully Undetectable telegram Rat dropper☆36Updated 4 years ago
- python remote access trojan☆36Updated 8 years ago