My metasploit modules
☆11Jul 7, 2015Updated 10 years ago
Alternatives and similar repositories for metasploit-modules
Users that are interested in metasploit-modules are comparing it to the libraries listed below
Sorting:
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 4 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- ☆16Nov 10, 2015Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- [Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth to…☆29Oct 13, 2017Updated 8 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Censys.io Python API Search☆43May 3, 2017Updated 8 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- A tool similar to netcat, but tunneled over DNS☆18Mar 10, 2017Updated 9 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 11 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 5 months ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Writing a 32-bit Protected Mode OS in NASM☆13Jun 22, 2012Updated 13 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- spy windows ce API calls☆11Jun 3, 2014Updated 11 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- Web based application for managing your Sourcemod servers and users☆13Aug 8, 2014Updated 11 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- [NO MAINTAINED] Delphi SDK for LeanCloud BaaS demo☆12Dec 6, 2019Updated 6 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago