☆118Feb 17, 2018Updated 8 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below
Sorting:
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- ☆12Aug 28, 2017Updated 8 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Color picker tool for deepin☆13Feb 7, 2018Updated 8 years ago
- Federated blockchain attestation daemon☆15Mar 25, 2024Updated last year
- It's not just UsnJrnl (USN Journal Records/Change Journal Records) parser.☆23Nov 11, 2018Updated 7 years ago
- libssh CVE-2018-10933☆21Oct 20, 2018Updated 7 years ago
- A database of options to use when pen testing an application. Sample XSS, SQLi and much more. It's been gathered over time. It's not perf…☆16Oct 21, 2020Updated 5 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- POC for injecting Metasploit payloads on arbitrary APKs☆65Feb 13, 2017Updated 9 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- ACM相关书籍与资料☆19May 17, 2021Updated 4 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- Linux bash script automation for metasploit☆268Jul 11, 2019Updated 6 years ago
- phpstudy批量检测mysql弱口令☆20Dec 2, 2015Updated 10 years ago
- ☆22May 9, 2024Updated last year
- Containerized Nextcloud tailored for Kubernetes / OpenShift☆19Oct 5, 2021Updated 4 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆24Mar 10, 2015Updated 11 years ago
- ☆25Jun 11, 2015Updated 10 years ago
- ESPot - ElasticSearch Honeypot☆28Aug 25, 2014Updated 11 years ago
- HGAME2020 官方 + 校内参赛选手 Writeup☆34Feb 17, 2020Updated 6 years ago
- 网络渗透侦测平台,start~☆23May 26, 2020Updated 5 years ago
- PHP代码审计分段讲解☆26Nov 13, 2017Updated 8 years ago
- Distributed Honeypot☆63Apr 29, 2018Updated 7 years ago
- 远控工具Njrat☆27May 9, 2019Updated 6 years ago
- ☆28Nov 20, 2017Updated 8 years ago
- Bitcoin Hush☆12Apr 29, 2020Updated 5 years ago
- Powershell攻击指南----黑客后渗透之道☆29Dec 13, 2017Updated 8 years ago
- Analyze Emails☆11Dec 8, 2022Updated 3 years ago
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- Packaging metasploit-framework with omnibus☆317Mar 3, 2026Updated last week
- Metasploit Framework☆37,643Mar 3, 2026Updated last week
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Jun 23, 2021Updated 4 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 8 years ago
- Kali Linux u-boot images☆31Apr 24, 2019Updated 6 years ago
- ☆32Oct 21, 2016Updated 9 years ago