π½ Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.
β30Dec 10, 2023Updated 2 years ago
Alternatives and similar repositories for Metasploit-Tutorial
Users that are interested in Metasploit-Tutorial are comparing it to the libraries listed below
Sorting:
- π Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's browsβ¦β13Nov 24, 2025Updated 3 months ago
- π€ TryHackMe Journey - Notes, Challenges & Writeups from the Pre-Security Learning Pathβ10Sep 27, 2022Updated 3 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resouβ¦β40Feb 24, 2023Updated 3 years ago
- Free, Autonomous Self-Orchestrating Local Agent in Javascript.β11May 10, 2023Updated 2 years ago
- An ESPHome component for accepting a secret PIN over Bluetooth LE.β11Apr 7, 2024Updated last year
- webrtc random video chatβ10Dec 30, 2015Updated 10 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)β11Oct 26, 2021Updated 4 years ago
- A PHP script to automatically like post in instagram timelineβ10May 5, 2021Updated 4 years ago
- Repository with all my personal academic projects, which use the knowledge I acquired during my time at university.β14Jul 23, 2024Updated last year
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank cardβ15Oct 25, 2017Updated 8 years ago
- An automation framework for CyberSecurity Toolsβ12Dec 6, 2025Updated 2 months ago
- Hardware Design for the Super Magfest 2024 Swadgeβ12May 4, 2024Updated last year
- π₯ CEHv12 Certificate documentation πβ10Jun 29, 2023Updated 2 years ago
- β11May 30, 2018Updated 7 years ago
- Generate Undetectable Metasploit Payload in a simple wayβ37Dec 19, 2023Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV'sβ32Oct 21, 2023Updated 2 years ago
- Terminal-based NetFlow/sFlow/IPFIX flow monitoring for OpenvSwitchβ17Jan 16, 2023Updated 3 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.β11Jan 30, 2015Updated 11 years ago
- β10May 8, 2024Updated last year
- Realtime Face Mask Detection in ~10 lines of Python Codeβ10Nov 10, 2020Updated 5 years ago
- Read wiegand input from a scanner, query a database over wifi and turn on a device or open a door.β10May 4, 2016Updated 9 years ago
- Python emulator of msfconsoleβ11Dec 28, 2019Updated 6 years ago
- Flipper Application Catalogβ17Feb 16, 2026Updated last week
- Pure Java (jsr80 usb) interface to the Cannon cameras running CHDK PTPβ15Jun 21, 2021Updated 4 years ago
- β12Mar 19, 2024Updated last year
- Front End for ESPEasy >>>>>>>NOT YET READY FOR PRODUCTION<<<<<<<<β11Dec 15, 2020Updated 5 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related informationβ12Nov 29, 2023Updated 2 years ago
- A tiny CAN bootloader for AVR and MCP2515β11May 20, 2012Updated 13 years ago
- Checks for Brave Browser Rewards Ad notifications on Windows and closes themβ10Jan 28, 2021Updated 5 years ago
- Google hackingβ11Apr 26, 2023Updated 2 years ago
- A handy declarative extension for methods access control in jagi:astronomy with decoratorsβ11Feb 8, 2018Updated 8 years ago
- collection of beacon object file (Cobalt strike)β12Jan 21, 2023Updated 3 years ago
- Use this to Download jio saavn songs without wastin goddamn moneyβ10Aug 31, 2020Updated 5 years ago
- How many lines/second can your Arduino print to the serial monitor?β12Jun 26, 2019Updated 6 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websiteβ¦β14Aug 23, 2022Updated 3 years ago
- β12Sep 27, 2018Updated 7 years ago
- ExplorerPy is a scanning-toolkit . It can perform subdomain enumeration, directory brute-forcing, and port scanning.β10Jan 30, 2024Updated 2 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD caβ¦β13Oct 6, 2020Updated 5 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycleβ11Apr 28, 2021Updated 4 years ago