dana-at-cp / metasploit-frameworkLinks
Metasploit Framework
☆10Updated 8 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Updated 10 years ago
- website admin panel finder☆34Updated 5 years ago
- to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network pas…☆57Updated 8 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago
- hackpack to go with lazykali on menu application Kali Linux☆30Updated 11 years ago
- Bypassing Android Pattern Lock☆69Updated 11 years ago
- ☆12Updated 4 years ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆22Updated 7 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆43Updated 8 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 8 years ago
- Auxile Framework☆28Updated 5 years ago
- Evil Twin Attack Bash script☆12Updated 9 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 8 years ago
- This is a collection of scripts to add to kali linux☆22Updated 7 years ago
- CUPP - Common User Passwords Profiler !☆15Updated last year
- Hacking Wifi-Passwords,Chrome-Saved-Passwords,Copying the Scripts to Windows-Startup folder,Index-Sites-Files-Downloader☆30Updated 8 years ago
- Unified repository for different Metasploit Framework payloads☆16Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Updated 8 years ago
- Python Security/Hacking Kit☆48Updated 6 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Updated 7 years ago
- A collection of scripts to run on a fresh install of kali linux☆36Updated 7 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Updated 11 years ago
- Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as …☆16Updated this week
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Updated 9 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆59Updated 3 years ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆65Updated 6 years ago
- Show info about the author by facebook photo url☆40Updated 8 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Updated 7 years ago
- Password Attack Toolkit☆16Updated 7 years ago