Msfvenom Advanced Obfuscated Payload Builder.
☆32Jun 2, 2025Updated 10 months ago
Alternatives and similar repositories for MSF-Build
Users that are interested in MSF-Build are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Config files for my GitHub profile.☆33Mar 27, 2026Updated last month
- Proxmark guide☆21Feb 7, 2025Updated last year
- Este script es una herramienta avanzada diseñada para administrar, crear y personalizar máquinas virtuales en entornos Docker, especialme…☆17Feb 2, 2025Updated last year
- "A modern and private application for creating, organizing and exporting CTF write-ups with AI assistance"☆41Jul 23, 2025Updated 9 months ago
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆46Oct 26, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆19May 20, 2025Updated 11 months ago
- PenKraken, herramienta de automatizacion de hacking Etico / Pentesting☆13Jun 14, 2024Updated last year
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆108Aug 1, 2025Updated 9 months ago
- wp-config-scan☆81Sep 6, 2023Updated 2 years ago
- Script to install in a Fedora OS the main tools used in pentesting.☆16Nov 22, 2021Updated 4 years ago
- Processing PST/EML/MBOX mail archives for Investigative Research☆27May 11, 2024Updated last year
- Comprehensive notes and resources to ace the eLearnSecurity Junior Penetration Testing certificate, helping you master the art of ethical…☆13Nov 27, 2023Updated 2 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 5 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆180Jun 10, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A comprehensive automation script for penetration testing and reconnaissance.☆43Jul 29, 2024Updated last year
- Cloud subdomains identification tool☆62Apr 15, 2025Updated last year
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- ☆19Aug 2, 2025Updated 8 months ago
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆22Apr 27, 2025Updated last year
- A phonebook.cz scraper☆16Apr 28, 2023Updated 3 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Sep 21, 2024Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆28Jan 29, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 10 months ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆99Oct 27, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Professional AI Hacking Platform☆62Mar 19, 2026Updated last month
- GRIM IS A INFORMATION GATHERER AND VULNERABILITY TESTER TOOL, YOU CAN USE IT ON ANY WEBSITE FOR GETTING ITS INFORMATION☆122Jun 6, 2021Updated 4 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 11 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆163Aug 28, 2025Updated 8 months ago
- ☆13Jan 4, 2026Updated 3 months ago
- Plataforma de CTI Assíncrona focada em Crimes Financeiros (Pix/Cripto) e Compliance Regulatório (Lei 14.790). Powered by LangGraph & Asyn…☆40Jan 14, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆20Sep 2, 2021Updated 4 years ago
- Automation for GoPhish internal phishing campaigns.☆20Jan 24, 2022Updated 4 years ago
- Linux port scan detector☆13Nov 20, 2017Updated 8 years ago
- FTDI bricker just for fun - malware POC+hardware hacking CTF☆19Sep 23, 2024Updated last year
- ShellValley is a user-friendly reverse shell generator tool, specially designed for CTF players who prefer to stay within their terminal …☆12Aug 11, 2023Updated 2 years ago
- an IOS tweaks app using only SwiftUI☆14Feb 4, 2023Updated 3 years ago
- ☆14Feb 25, 2026Updated 2 months ago