RootUp / AutoSploitLinks
Autosploit = Automating Metasploit Modules.
☆77Updated 6 years ago
Alternatives and similar repositories for AutoSploit
Users that are interested in AutoSploit are comparing it to the libraries listed below
Sorting:
- Massive arsenal of hacker tools...☆79Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- The Metasploit GUI☆90Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- ☆19Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- ☆82Updated last year
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Automated Pentest Tools Designed For Parrot Linux☆86Updated 6 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Simple Webshell Scanner☆51Updated 10 years ago
- ☆58Updated 5 years ago
- Some wordpress user enumeration scripts.☆38Updated 8 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆124Updated 6 years ago
- Red Login: SSH Brute-force Tools☆105Updated 7 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆31Updated 8 years ago
- mosquito - Automating reconnaissance and brute force attacks☆132Updated 5 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 8 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆125Updated 2 years ago
- pentest toolbox☆28Updated 3 years ago
- Social Engineering Toys☆36Updated 9 years ago
- Trying to be the best tool to search for exploits in the terminal.☆20Updated 2 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 9 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- Web application backdoor builder☆73Updated 4 years ago