Terminator metasploit payload generator
☆180May 29, 2018Updated 7 years ago
Alternatives and similar repositories for Terminator
Users that are interested in Terminator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- ☆99May 3, 2018Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆213Mar 27, 2022Updated 4 years ago
- Simple python backdoor with Ngrok tunnel support☆207Dec 9, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- NXcrypt - 'python backdoor' framework☆366Jun 26, 2017Updated 8 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆294Feb 28, 2018Updated 8 years ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆208Oct 31, 2018Updated 7 years ago
- Yet Another MOnitoring Tool☆61Apr 21, 2018Updated 7 years ago
- Linux bash script automation for metasploit☆268Jul 11, 2019Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2018-8174 - VBScript memory corruption exploit.☆169May 23, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆815Apr 21, 2023Updated 2 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127May 30, 2018Updated 7 years ago
- Auto Root Exploit Tool☆536Jun 15, 2023Updated 2 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Social Engineering Tool☆189Jul 24, 2018Updated 7 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆279Aug 24, 2023Updated 2 years ago
- Empire client application☆504Mar 10, 2022Updated 4 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, …☆419Feb 18, 2023Updated 3 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Jan 21, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- This is a plugin for the c# R.A.T server providing extension to android based phone systems☆20Mar 2, 2018Updated 8 years ago
- WPHunter A Wordpress Vulnerability Scanner☆168Mar 23, 2018Updated 8 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆144Dec 9, 2025Updated 3 months ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆264Nov 15, 2020Updated 5 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago