☆118Feb 17, 2018Updated 8 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- metasploitHelper☆253Apr 3, 2020Updated 6 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆65Feb 13, 2017Updated 9 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- A set of vulnerable PHP scripts used to test w3af's vulnerability detection features.☆28Apr 15, 2015Updated 10 years ago
- ☆827Jan 29, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- A database of options to use when pen testing an application. Sample XSS, SQLi and much more. It's been gathered over time. It's not perf…☆16Oct 21, 2020Updated 5 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- lzma-uncramfs is a modification of the uncramfs program to be able to unpack cramfs images included in some openrg based home routers. It…☆12Jul 20, 2021Updated 4 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Updaters para wifislax☆30Sep 3, 2016Updated 9 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- libssh CVE-2018-10933☆22Oct 20, 2018Updated 7 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple Software Vulnerability Language (SSVL)☆14Jan 21, 2015Updated 11 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- ☆22Dec 23, 2021Updated 4 years ago
- A repository for me to store my GNRC flowgraphs☆15Sep 2, 2024Updated last year
- Unified repository for different Metasploit Framework payloads☆1,982Updated this week
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- Use websockets with twisteds ProcessProtocol☆22Apr 11, 2016Updated 9 years ago
- Code for installing various security minded tools onto Vagrant powered virtual machines☆171Jul 21, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Download your photos from Instagram☆16Jun 5, 2022Updated 3 years ago
- [OBSOLETE] Superseded by https://github.com/upx/upx-vendor-lzma-sdk☆26May 15, 2021Updated 4 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Restores firmware and filesystem to iPhone/iPod Touch☆11Jun 7, 2010Updated 15 years ago
- A library to handle Apple Property List format in binary or XML☆18Feb 11, 2012Updated 14 years ago
- In this Thread, I`m gonna show you how to install Metasploit Framework in TermuX. You can use it for Android to Android/Windows hacking. …☆27Aug 13, 2019Updated 6 years ago
- cSploit network radar☆33Apr 10, 2016Updated 10 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Mar 11, 2014Updated 12 years ago
- Autosploit = Automating Metasploit Modules.☆77Jul 14, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Kali Linux u-boot images☆31Apr 24, 2019Updated 6 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- Quack Toolkit is a set of a denial of service attack methods. Quack includes SMS attack method, HTTP attack method and many other attack …☆16Feb 12, 2020Updated 6 years ago
- Phone number tracer in bash, enjoy!☆10Dec 2, 2021Updated 4 years ago
- Miscellaneous JScript, VBScript, WSF XML, HTA HTML, PowerShell, Batch, etc. for Windows☆15Oct 30, 2017Updated 8 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago