RootUp / AutoSploit
Autosploit = Automating Metasploit Modules.
☆76Updated 5 years ago
Alternatives and similar repositories for AutoSploit:
Users that are interested in AutoSploit are comparing it to the libraries listed below
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆124Updated 5 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- ElevenPaths EternalBlue Metasploit module - works better than Rapid 7☆57Updated 7 years ago
- Massive arsenal of hacker tools...☆77Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 7 years ago
- ☆79Updated last year
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- ☆19Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Simple Webshell Scanner☆50Updated 10 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- The Metasploit GUI☆88Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- a hash query tool☆37Updated 6 years ago
- web information gathering / Grab links☆42Updated 5 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆86Updated 10 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- ☆56Updated 4 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- Web application backdoor builder☆72Updated 3 years ago
- Trying to be the best tool to search for exploits in the terminal.☆19Updated 2 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Gathering Email Information Tool☆37Updated 8 years ago