carnal0wnage / Metasploit-CodeLinks
Metasploit modules that didn't make it into trunk for some reason or the other
☆122Updated 7 years ago
Alternatives and similar repositories for Metasploit-Code
Users that are interested in Metasploit-Code are comparing it to the libraries listed below
Sorting:
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- Meterpreter Scripts that I'm working on☆174Updated 6 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- A JBoss script for obtaining remote shell access☆173Updated 4 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- ☆138Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆185Updated 9 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆209Updated 7 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆170Updated 7 years ago
- Dirbuster plugin for Burp Suite☆70Updated 8 years ago
- ☆194Updated 6 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- Port of eternal blue exploits to powershell☆150Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆69Updated 10 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- Check for valid credentials across a network over SMB☆263Updated last year
- Automatically performs the SMB relay attack☆72Updated 9 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆197Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆254Updated 9 years ago
- scripts for pentesting☆88Updated 6 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- Useful pentesting scripts☆83Updated 4 months ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- DefCon24☆121Updated 8 years ago