Autosploit = Automating Metasploit Modules.
☆77Jul 14, 2019Updated 6 years ago
Alternatives and similar repositories for AutoSploit
Users that are interested in AutoSploit are comparing it to the libraries listed below
Sorting:
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 5 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- metasploitHelper☆252Apr 3, 2020Updated 5 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- ☆84Oct 8, 2023Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Sep 6, 2024Updated last year
- ☆41May 16, 2018Updated 7 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆18Sep 27, 2018Updated 7 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 8 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- A simple bash based metasploit automation tool!☆125Feb 16, 2023Updated 3 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Apr 20, 2020Updated 5 years ago
- ☆19Jun 8, 2017Updated 8 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- Metasploit Exploiting Tool For Linux☆21Sep 27, 2021Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Nov 23, 2017Updated 8 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆32Mar 4, 2021Updated 4 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Jun 24, 2018Updated 7 years ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆380Jan 29, 2020Updated 6 years ago
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆29Mar 8, 2021Updated 4 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Burp Suite Extension with MCP Server to enhance manual application security testing☆34Jan 21, 2026Updated last month
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Oct 30, 2024Updated last year
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago