bcoles / metasploit-logosLinks
Custom Metasploit logos
☆54Updated 4 years ago
Alternatives and similar repositories for metasploit-logos
Users that are interested in metasploit-logos are comparing it to the libraries listed below
Sorting:
- A shell script that mimics sudo and sends you back the password☆45Updated 3 years ago
- PowerShell payload generator☆120Updated 4 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 6 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆40Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Updated 6 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated last week
- Transform your batch (bat) script into one binary.exe☆52Updated 2 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 6 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Updated 4 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 5 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Updated 3 years ago
- Linux Persistence Toolkit☆73Updated 3 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆113Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated last year
- Passwordless RDP Session Hijacking☆70Updated 4 years ago
- Some random tools I use for penetration testing☆91Updated 3 weeks ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 7 years ago