Metasploit Framework
☆25Jan 12, 2020Updated 6 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 10 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- ☆21Mar 18, 2019Updated 6 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Sep 12, 2017Updated 8 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- ☆19May 31, 2017Updated 8 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆53Jun 15, 2022Updated 3 years ago
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Small, one-off scripts for security related stuff I've written over time☆37Mar 2, 2025Updated last year
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- CentOS Control Web Panel, Root Privilege Escalation☆67Oct 25, 2019Updated 6 years ago
- Vulnerability Reports by Aleph Research☆36Mar 10, 2024Updated last year
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- Learning PySpark video series☆11Mar 5, 2018Updated 7 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Wrappers around smbclient and winexe with PTH support☆33Feb 23, 2016Updated 10 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- A small two-file JSON serializer in C# that works on MonoDroid/MonoTouch☆11Jun 25, 2019Updated 6 years ago
- Get chrome passwords from chrome database in powershell☆33Apr 5, 2019Updated 6 years ago
- ☆34Jan 1, 2019Updated 7 years ago
- ☆36Feb 17, 2020Updated 6 years ago
- ☆35Nov 3, 2019Updated 6 years ago