☆119Feb 17, 2018Updated 8 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC for injecting Metasploit payloads on arbitrary APKs☆65Feb 13, 2017Updated 9 years ago
- A set of vulnerable PHP scripts used to test w3af's vulnerability detection features.☆28Apr 15, 2015Updated 11 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Log-Bilinear Document Model☆18Jun 28, 2011Updated 14 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- A database of options to use when pen testing an application. Sample XSS, SQLi and much more. It's been gathered over time. It's not perf…☆16Oct 21, 2020Updated 5 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- MSF database code, gemified☆55Apr 21, 2026Updated last week
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- libssh CVE-2018-10933☆22Oct 20, 2018Updated 7 years ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Source code of QEMU☆19Apr 15, 2021Updated 5 years ago
- Unified repository for different Metasploit Framework payloads☆1,995Apr 3, 2026Updated 3 weeks ago
- ☆15Aug 8, 2017Updated 8 years ago
- Use websockets with twisteds ProcessProtocol☆22Apr 11, 2016Updated 10 years ago
- Code for installing various security minded tools onto Vagrant powered virtual machines☆171Jul 21, 2014Updated 11 years ago
- Download your photos from Instagram☆16Jun 5, 2022Updated 3 years ago
- Metasploit Framework☆38,037Updated this week
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆20Sep 16, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A library to handle Apple Property List format in binary or XML☆18Feb 11, 2012Updated 14 years ago
- In this Thread, I`m gonna show you how to install Metasploit Framework in TermuX. You can use it for Android to Android/Windows hacking. …☆27Aug 13, 2019Updated 6 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Mar 11, 2014Updated 12 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Autosploit = Automating Metasploit Modules.☆77Jul 14, 2019Updated 6 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- SecurityTube Hack of the Day☆17Apr 2, 2013Updated 13 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago
- Kali Linux u-boot images☆32Apr 24, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- Quack Toolkit is a set of a denial of service attack methods. Quack includes SMS attack method, HTTP attack method and many other attack …☆16Feb 12, 2020Updated 6 years ago
- Forked from git://git.dollyfish.net.nz/mutt-filters - which seems to have disapeared☆17Feb 22, 2022Updated 4 years ago
- More simple and convenient C++ library to manipulate json and plist, maybe better than libplist.☆18Apr 14, 2026Updated 2 weeks ago
- ☆39Apr 24, 2019Updated 7 years ago
- Read Cyberpunk 2077 hacking minigame details with a phone camera online. OpenCV magic in your browser.☆17Jun 20, 2022Updated 3 years ago