dana-at-cp / metasploit-framework
Metasploit Framework
☆10Updated 7 years ago
Related projects: ⓘ
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆19Updated 9 years ago
- Unified repository for different Metasploit Framework payloads☆13Updated 7 years ago
- ☆17Updated this week
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Updated 3 years ago
- ☆25Updated this week
- ☆23Updated this week
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆40Updated 6 years ago
- Example packet.proxy plugins.☆21Updated 3 years ago
- Bypass XSS Reflected Cross-site scripting☆29Updated 8 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- Trickbot configuration repository☆8Updated 6 years ago
- The LAZY script will make your life easier, and of course faster.☆8Updated 7 years ago
- A full-fledged msfrpc library for Metasploit framework.☆11Updated 7 years ago
- ☆16Updated this week
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆28Updated 8 years ago
- SIP hacking tools and scripts☆23Updated 3 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network pas…☆48Updated 6 years ago
- Note:- Run this Script in root user.☆15Updated 6 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Updated 5 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆18Updated 5 years ago
- Script to change all MAC Addresses☆12Updated 10 years ago
- Default Payloads to Attach to Emails When Using Gophish☆9Updated 8 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆10Updated 10 years ago
- ☆18Updated this week
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆10Updated 5 years ago
- Attacking WPA/WPA encrypted access point without client.☆46Updated 10 years ago
- ☆14Updated this week