Automate Metasploit scanning and exploitation
☆118Jul 20, 2025Updated 7 months ago
Alternatives and similar repositories for Exploitivator
Users that are interested in Exploitivator are comparing it to the libraries listed below
Sorting:
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.☆165May 21, 2020Updated 5 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- HashCobra Hash Cracking tool.☆122Dec 1, 2020Updated 5 years ago
- Parse .nessus file(s) and shows output in interactive UI☆163Jan 5, 2026Updated last month
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆243Feb 6, 2021Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- traxss | Automated XSS Vulnerability Scanner Currently In Development HACKTOBERFEST PROJECT 2019☆185May 22, 2023Updated 2 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Feb 17, 2026Updated last week
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- thethe☆115Oct 21, 2020Updated 5 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- A backdoor with a multitude of features.☆293Oct 3, 2024Updated last year
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- ☆128May 22, 2023Updated 2 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆68Jan 15, 2026Updated last month
- Tool to brute website sub-domains and dirs.☆49May 13, 2020Updated 5 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Dec 10, 2024Updated last year
- ☆25May 9, 2021Updated 4 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- A very fast and smart web directory and file enumeration tool written in C.☆141Sep 15, 2025Updated 5 months ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago