Qubasa / msf-remote-consoleLinks
A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules permanently as daemon on your server like autopwn2.
☆57Updated 7 years ago
Alternatives and similar repositories for msf-remote-console
Users that are interested in msf-remote-console are comparing it to the libraries listed below
Sorting:
- Metasploit Usage Wiki☆47Updated 10 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆85Updated 11 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Useful pentesting scripts☆84Updated 11 months ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 9 years ago
- ☆47Updated 10 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- ☆84Updated 2 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- ssh session type for metasploit☆101Updated 2 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- Easy Window domain access☆51Updated 11 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago
- Script to generate malicious debian packages (debain trojans).☆119Updated 6 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- Search exploits in multiple exploit databases!☆86Updated 5 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago