Metasploit Framework
☆25Jan 12, 2020Updated 6 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Some setup scripts for security research tools.☆11May 10, 2015Updated 11 years ago
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 11 years ago
- CentOS Control Web Panel, Root Privilege Escalation☆66Oct 25, 2019Updated 6 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Learning PySpark video series☆11Mar 5, 2018Updated 8 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Jan 17, 2022Updated 4 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Listing my favorite research papers 📝 from different fields as I read them.☆10Oct 17, 2019Updated 6 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 10 years ago
- Lutech TMS EHAT-NG☆14Jul 8, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- DockerFiles for Docker Containers☆16Sep 2, 2017Updated 8 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Sep 12, 2017Updated 8 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- ☆27Dec 5, 2019Updated 6 years ago
- ☆39Mar 21, 2021Updated 5 years ago
- ☆15Mar 8, 2017Updated 9 years ago
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 11 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Jan 23, 2018Updated 8 years ago
- TokyoWesterns CTF 4th 2018 shrine☆12Aug 23, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Botoflow is an asynchronous framework for Amazon SWF that helps you build SWF applications using Python☆13Dec 26, 2022Updated 3 years ago
- A Python script to swoop and decrypt passwords from Chrome's local storage.☆11Dec 10, 2018Updated 7 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 3 years ago
- Stub for polymorphic code☆11Mar 18, 2023Updated 3 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- Python scripts for Agisoft Photoscan☆12Jun 18, 2015Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- ☆19May 31, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A C++ cross-platform log library.☆13Jun 4, 2022Updated 3 years ago
- Dump the saved wifi passwords for windows using regular expressions and python 3☆18Dec 22, 2016Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- IP画像业务安全版私有化 部署SDK☆13Dec 8, 2022Updated 3 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- Small, one-off scripts for security related stuff I've written over time☆37Mar 2, 2025Updated last year