👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.
☆32Dec 10, 2023Updated 2 years ago
Alternatives and similar repositories for Metasploit-Tutorial
Users that are interested in Metasploit-Tutorial are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 📡 Foundational understanding of Computer Networking for learners☆24Sep 30, 2023Updated 2 years ago
- Binance Email Support Clone☆18Mar 20, 2024Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Dec 19, 2023Updated 2 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Feb 11, 2026Updated 2 months ago
- Python emulator of msfconsole☆11Dec 28, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆43Sep 6, 2024Updated last year
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- git clone https://github.com/htr-tech/zphisher☆34Apr 22, 2020Updated 6 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 4 months ago
- CEH Practical☆55Aug 14, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆24Apr 12, 2023Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Jun 14, 2019Updated 6 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 6 months ago
- SQL injector vulnerability scanner and exploiter along with sqli dork scanner☆12Dec 20, 2021Updated 4 years ago
- ☆10May 8, 2024Updated last year
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Free, Autonomous Self-Orchestrating Local Agent in Javascript.☆11May 10, 2023Updated 2 years ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated 2 years ago
- Python for Defenders Course Resources☆20Mar 12, 2026Updated last month
- Lord of SQL Injection (주석은 한글로 작성되어 있습니다. / Comments were written in Korean!)☆14Aug 22, 2017Updated 8 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 4 years ago
- A simple BOF (Beacon Object File) to search files in the system☆16Dec 2, 2023Updated 2 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Rust-based dropper for shellcode payloads.☆72Mar 21, 2025Updated last year
- ofrip - OnlyFans ripper☆17Mar 21, 2020Updated 6 years ago
- Correction and installation of WIFITE's HCX dependencies/Correção e instalação das dependências HCX do WIFITE☆13Dec 21, 2023Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Sep 6, 2024Updated last year
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines and technical resou…☆14Apr 9, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆11Mar 25, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago