Mister2Tone / metasploit-webappLinks
Metasploit framework via HTTP services
☆11Updated 3 years ago
Alternatives and similar repositories for metasploit-webapp
Users that are interested in metasploit-webapp are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Search bing with python☆12Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Synack Red Team Firewall Script☆10Updated 10 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- Network aware keylogger: broadcasting on your local area network.☆21Updated 11 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆14Updated 6 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago