Custom Metasploit logos
☆54Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for metasploit-logos
Users that are interested in metasploit-logos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Various exploits for SerenityOS☆17Oct 29, 2021Updated 4 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- Discord C2 Profile for Mythic☆32Feb 18, 2025Updated last year
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Lazily wraps various Linux system auditing tools☆20Oct 26, 2025Updated 4 months ago
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated 11 months ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Kali linux virtual machine termux☆12Jun 18, 2021Updated 4 years ago
- MSF database code, gemified☆55Mar 5, 2026Updated 2 weeks ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Kali Linux in Termux Proot-Distro | Rootless☆20Oct 17, 2025Updated 5 months ago
- Stækka Metasploit - Extenting Metasploit☆54Jul 7, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Image and Script for LinuxOnAndroid App☆14Sep 22, 2019Updated 6 years ago
- ☆29Feb 20, 2024Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Rust library for showing text based progress bar and job status☆10Nov 18, 2022Updated 3 years ago
- Shellcode Of Death☆43Aug 31, 2013Updated 12 years ago
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Easily and colorfully run Metasploit on most android devices in Termux..☆24Apr 27, 2020Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Aug 7, 2020Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A brute force, heuristics, stadistical and down the hill solution to solve enigma msg by KPA. ( mirror from https://code.haibane.org/cap…☆13Oct 2, 2021Updated 4 years ago
- ☆26Mar 3, 2022Updated 4 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Oct 16, 2019Updated 6 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- Vagrant Box that will deploy a bare ubuntu box (vmware or virtualbox) and install MSF on top.☆38May 13, 2022Updated 3 years ago
- My (n)Vim config files☆19Dec 27, 2022Updated 3 years ago
- A collection of pen-testing/hacking scripts. Various uses.☆13Oct 24, 2020Updated 5 years ago