PacktPublishing / The-Complete-Metasploit-Guide
Explore effective penetration testing techniques with Metasploit
☆14Updated 2 years ago
Alternatives and similar repositories for The-Complete-Metasploit-Guide
Users that are interested in The-Complete-Metasploit-Guide are comparing it to the libraries listed below
Sorting:
- Web Penetration Testing with Kali Linux - Third Edition, published by Packt☆30Updated 4 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆25Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆16Updated 6 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆24Updated 3 years ago
- Mastering Kali Linux for Advanced Penetration Testing Third Edition, published by Packt☆73Updated 4 years ago
- SSG SIEM Tool☆16Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 6 years ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆20Updated 6 years ago
- Python Penetration Testing Essentials, Second Edition, published by Packt☆27Updated 4 years ago
- ☆42Updated 3 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Kali Linux Network Scanning Cookbook Second Edition, published by Packt☆17Updated 4 years ago
- Black Hat Python for Pentesters & Hackers, published by Packt☆23Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆46Updated 4 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- An automated e-mail OSINT tool☆21Updated 3 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆11Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 5 years ago
- Digital Forensics with Kali Linux, published by Packt☆92Updated 2 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated 11 months ago
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Updated 6 years ago
- Code Repository for CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019, published by Packt☆11Updated 2 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Updated 2 years ago
- Recon Automation for BugBounties☆11Updated 8 months ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆22Updated 4 months ago
- shamelessly ripped from https://github.com/khalilbijjou/WAFNinja/☆19Updated 8 years ago
- Subdomain Bruteforce - Bounty Quick Code☆30Updated 8 months ago
- Script para la instalación automática de una capa de personalización en Kali Linux OS.☆17Updated this week