This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risks, vulnerabilities, and post-exploitation activities, emphasizing proactive cybersecurity measures. This knowledge empowers organizations to fortify defenses, ensuring a safer digital landscape.
☆29Aug 13, 2023Updated 2 years ago
Alternatives and similar repositories for Metasploit-remote-pc-hacking
Users that are interested in Metasploit-remote-pc-hacking are comparing it to the libraries listed below
Sorting:
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 7 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Jun 26, 2023Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- A tool to enumerate and exploit SQL Servers in AD☆33Aug 21, 2023Updated 2 years ago
- ☆55Apr 25, 2023Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated last year
- ☆20Jan 9, 2024Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- wsnet☆26Feb 19, 2026Updated last week
- ☆90Aug 5, 2023Updated 2 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- ☆27May 1, 2023Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated 3 weeks ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆42Apr 4, 2025Updated 10 months ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆46Apr 9, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- Goby-Poc-Collection for Goby scanner https://github.com/gobysec/Goby - forked from many github accounts Thanks the authors☆12Dec 10, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆130Jun 1, 2024Updated last year
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆103Dec 8, 2025Updated 2 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year