Metasploit Framework
☆25Jan 12, 2020Updated 6 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 11 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Jan 17, 2022Updated 4 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Listing my favorite research papers 📝 from different fields as I read them.☆10Oct 17, 2019Updated 6 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Sep 12, 2017Updated 8 years ago
- Flexible, high performance IMDB & disk hybrid database written in Go. Features a brand-new modernistic query language and deep schema va…☆13Apr 21, 2024Updated last year
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- ☆39Mar 21, 2021Updated 5 years ago
- ☆15Mar 8, 2017Updated 9 years ago
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 10 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Jan 23, 2018Updated 8 years ago
- TokyoWesterns CTF 4th 2018 shrine☆12Aug 23, 2019Updated 6 years ago
- Botoflow is an asynchronous framework for Amazon SWF that helps you build SWF applications using Python☆13Dec 26, 2022Updated 3 years ago
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Stub for polymorphic code☆11Mar 18, 2023Updated 3 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- ☆26Nov 20, 2019Updated 6 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- ☆19May 31, 2017Updated 8 years ago
- ☆11May 24, 2017Updated 8 years ago
- A C++ cross-platform log library.☆13Jun 4, 2022Updated 3 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(C发行版本)☆20Nov 20, 2019Updated 6 years ago
- ☆11Mar 16, 2023Updated 3 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- GeSWall, Intrusion Prevention System for Windows☆22Jan 18, 2026Updated 2 months ago
- ☆11Sep 18, 2017Updated 8 years ago
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago