brimstone / metasploitable3Links
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
☆48Updated 7 years ago
Alternatives and similar repositories for metasploitable3
Users that are interested in metasploitable3 are comparing it to the libraries listed below
Sorting:
- Active Directory Wordlists☆98Updated 5 years ago
- https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite☆37Updated 10 months ago
- Totally Insecure Web Application Project (TIWAP)☆174Updated last year
- ☆38Updated 2 years ago
- Writeup Challenges I have solved in CTF competitions☆24Updated 2 years ago
- ☆55Updated 6 years ago
- ☆228Updated 2 years ago
- Burp Suite Logger++: Log activities of all the tools in Burp Suite☆175Updated last year
- Windows for Red Teamers☆126Updated 3 years ago
- db_autopwn plugin of metasploit☆236Updated 5 years ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆11Updated 3 years ago
- Notes compiled for the OSCP exam.☆155Updated 3 years ago
- Troubleshooting bash script for the TryHackMe OpenVPN connection pack☆105Updated 2 years ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆113Updated 6 years ago
- https://alvinsmith.gitbook.io/progressive-oscp/☆40Updated 3 months ago
- this repository is a docker containing some "XSS vulnerability" challenges and bypass examples.☆117Updated 3 years ago
- Collection of username lists for enumerating kerberos domain users☆94Updated 7 years ago
- OSCP cheatsheet☆108Updated last year
- Local penetration testing lab using docker-compose.☆201Updated last month
- modified content from pentestmonkey.net☆65Updated 4 years ago
- Writeups for vulnerable machines.☆175Updated 2 years ago
- Python script wrote to automate the process of generating various reverse shells.☆202Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 4 years ago
- ☆170Updated 3 years ago
- List of red team resources☆94Updated 7 years ago
- ☆108Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- A python based blind SQL injection exploitation script☆136Updated 5 years ago
- The official Exploit Database repository☆43Updated 7 years ago