Custom Metasploit logos
☆54Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for metasploit-logos
Users that are interested in metasploit-logos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Various exploits for SerenityOS☆17Oct 29, 2021Updated 4 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 8 months ago
- Custom (non-official) evil-portals for the awesome Wifi Pineapple (https://wifipineapple.com)☆15Dec 7, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆30May 11, 2026Updated last week
- Lazily wraps various Linux system auditing tools☆20Mar 20, 2026Updated 2 months ago
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated last year
- ☆22Mar 16, 2020Updated 6 years ago
- Kali linux virtual machine termux☆12Jun 18, 2021Updated 4 years ago
- MSF database code, gemified☆56Apr 21, 2026Updated last month
- ☆15Oct 9, 2021Updated 4 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Stækka Metasploit - Extenting Metasploit☆54Jul 7, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Image and Script for LinuxOnAndroid App☆14Sep 22, 2019Updated 6 years ago
- Aggressive Mass AP Deauth/Jammer (PWN ALL WIFI IN RANGE)☆14May 26, 2023Updated 2 years ago
- Eternalblue-Doublepulsar-Metasploit☆21May 11, 2017Updated 9 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Packages using the X Window System.☆12Feb 9, 2019Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Shellcode Of Death☆43Aug 31, 2013Updated 12 years ago
- only for 31337☆25Nov 19, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Easily and colorfully run Metasploit on most android devices in Termux..☆24Apr 27, 2020Updated 6 years ago
- ☆14Mar 31, 2018Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 13 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- termux_launcher☆15Jan 11, 2019Updated 7 years ago
- ☆17Feb 12, 2018Updated 8 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆97Aug 7, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Read-only release history for ttylog☆16Oct 22, 2014Updated 11 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Oct 16, 2019Updated 6 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- ☆27Mar 3, 2022Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago