cyberspacekittens / metasploit-payloadsView external linksLinks
Unified repository for different Metasploit Framework payloads
☆10Apr 2, 2018Updated 7 years ago
Alternatives and similar repositories for metasploit-payloads
Users that are interested in metasploit-payloads are comparing it to the libraries listed below
Sorting:
- ☆13Apr 22, 2015Updated 10 years ago
- ☆18Sep 24, 2024Updated last year
- Bypass Medium paywalls on mobile. Paste or share a link to read instantly.☆31Oct 28, 2025Updated 3 months ago
- ☆16Sep 4, 2024Updated last year
- A TLS encrypted Reverse Shell☆36Mar 25, 2023Updated 2 years ago
- Arya is a simple obfuscator for .NET binaries.☆38Dec 11, 2017Updated 8 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Apr 4, 2022Updated 3 years ago
- An AI agent with Daraja API intergration for completing Mpesa and data requests transactions☆12May 29, 2025Updated 8 months ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- ☆42Apr 20, 2018Updated 7 years ago
- Latest version of evilginx2 with Gophish + Telegram modification☆11Nov 17, 2024Updated last year
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- RISC-V to x86/64 instruction emulator written in C/C++☆10Jan 10, 2022Updated 4 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 2 months ago
- JavaScript program to dump contents of HTML5 Web Storage on Google Chrome directly from the file system☆10Oct 11, 2018Updated 7 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- ChatGPT terminal assistant with a good memory to be used in ethical hacking, offensive cybersecurity and red teaming. **Warning:** These …☆10Mar 20, 2024Updated last year
- ☆13Dec 3, 2022Updated 3 years ago
- ☆11May 24, 2017Updated 8 years ago
- testing123☆12Nov 23, 2024Updated last year
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆11Feb 5, 2024Updated 2 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12Mar 22, 2021Updated 4 years ago
- Quick tool to create custom wordlists like how fuzzers work☆10Sep 29, 2023Updated 2 years ago
- Get a website's html code for scraping purposes.☆11Sep 20, 2022Updated 3 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- ✉️ Use the power of browser-use to contact any person or organization... by any means necessary☆33Jul 30, 2025Updated 6 months ago
- Facilitating efficient transaction tracing for Tornado Cash and Railgun☆17Mar 26, 2024Updated last year
- A python polymorphic engine for C programs☆12Dec 8, 2023Updated 2 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- ユーザーに関する詳細情報を取得できるJavaScriptです。☆12Mar 27, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/gtkdialog☆10Nov 11, 2022Updated 3 years ago
- CSharp4Pentesters☆12Mar 5, 2022Updated 3 years ago
- A SATySFi package to build simple tables.☆17Apr 30, 2022Updated 3 years ago
- A C++ String-like-class that does not save data as plain-text in memory. It makes live analysis of memory more difficult, as well as fore…☆12Aug 16, 2014Updated 11 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago