☆84Oct 8, 2023Updated 2 years ago
Alternatives and similar repositories for Metasploit-Resource-Scripts
Users that are interested in Metasploit-Resource-Scripts are comparing it to the libraries listed below
Sorting:
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆106Sep 9, 2022Updated 3 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Simple (web-) application vulnerability management system☆21Aug 14, 2014Updated 11 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆13Aug 7, 2016Updated 9 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆184Aug 13, 2024Updated last year
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Autosploit = Automating Metasploit Modules.☆77Jul 14, 2019Updated 6 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- metasploitHelper☆252Apr 3, 2020Updated 5 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago