chiehwen / exploitpackLinks
Exploit Pack - One step ahead
☆11Updated 11 years ago
Alternatives and similar repositories for exploitpack
Users that are interested in exploitpack are comparing it to the libraries listed below
Sorting:
- Optional plugins for MITMf☆15Updated 10 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Software exploitation training material☆15Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆17Updated 11 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- AES encrypted python backdoor that communicates AES encrypted data☆9Updated 10 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆27Updated 9 years ago
- My metasploit modules☆23Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago