Mikaayenson / pymetasploit
A full-fledged msfrpc library for Metasploit framework.
☆8Updated 7 years ago
Alternatives and similar repositories for pymetasploit:
Users that are interested in pymetasploit are comparing it to the libraries listed below
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆53Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Software exploitation training material☆15Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- ☆15Updated 2 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- A ton of helpful tools☆16Updated 8 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- ☆47Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Basic Auth Phish page☆25Updated 7 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- MS17-010☆12Updated 7 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 7 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Create lists from nmap output.☆13Updated 4 years ago