C# bindings for the Metasploit RPC
☆20Nov 7, 2016Updated 9 years ago
Alternatives and similar repositories for metasploit-sharp
Users that are interested in metasploit-sharp are comparing it to the libraries listed below
Sorting:
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Security Tools written in Golang☆12Sep 2, 2020Updated 5 years ago
- Tool for navigating Python call graphs. Old project page: https://github.com/nccgroup/call_map☆18Apr 10, 2023Updated 2 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- A tool to brute force forms based authentication mechanism☆11Nov 2, 2019Updated 6 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Jul 19, 2021Updated 4 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- A backport of the Task Parallel Library to .NET 3.5☆22Feb 15, 2022Updated 4 years ago
- Provides the ability to patch/hook functions imported by a dll or executable☆35May 31, 2010Updated 15 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- A debugger / emulator for Ghidra☆14Oct 30, 2019Updated 6 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- PowerShell script that gathers data about logons and logoffs from Event Logs.☆12Aug 2, 2013Updated 12 years ago
- An fully asynchronous .Net HTTP proxy focused on performance☆24Nov 26, 2018Updated 7 years ago
- POCs for IOMemoryDescriptor racing bugs in iOS/OSX kernels☆20Jan 8, 2017Updated 9 years ago
- A proof-of-concept LTC miner in javascript.☆44May 26, 2013Updated 12 years ago
- ☆106Jan 16, 2020Updated 6 years ago
- CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.☆25Apr 12, 2020Updated 5 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 11 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- ☆11Jun 25, 2021Updated 4 years ago
- Bokken is a GUI for radare2. Don't use this, use https://github.com/radareorg/cutter.☆11Feb 11, 2017Updated 9 years ago
- oops i did it again☆10Aug 10, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- .NET Standard compatible Slack RTM client☆10Sep 14, 2022Updated 3 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆26Oct 13, 2019Updated 6 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- A Ruby library for working with Google's Cayley graph database.☆23Oct 19, 2014Updated 11 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆29Apr 1, 2017Updated 8 years ago
- ☆10Jan 7, 2020Updated 6 years ago
- WebCL conformance tests☆20Feb 9, 2018Updated 8 years ago