Unified repository for different Metasploit Framework payloads
☆16Apr 3, 2017Updated 9 years ago
Alternatives and similar repositories for metasploit-payloads
Users that are interested in metasploit-payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆24May 8, 2018Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- An OTA update engine for rooted Google Chromecasts☆19Nov 13, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This project aims to capture network traffic on a local network, filter out packets related to WhatsApp calls, and extract the public IP …☆27Jan 21, 2025Updated last year
- Automated Ip Tracking Tool☆26Apr 2, 2023Updated 3 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago
- Send multi mail to your target mails from your multi mails☆16Oct 14, 2025Updated 6 months ago
- Frida depends on the excellent Capstone disassembly framework☆20Feb 6, 2026Updated 3 months ago
- This is an apk file analysis system☆25Jul 19, 2017Updated 8 years ago
- The best tool to check the list of phone numbers for cut which have Telegram accounts☆11Oct 14, 2025Updated 6 months ago
- ☆12Mar 10, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆16Jan 7, 2026Updated 4 months ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 6 years ago
- sms bomber in django☆14May 28, 2021Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,351Sep 12, 2022Updated 3 years ago
- The Pro Version Of Telegram Bulk Message Sender By Multiple Accounts☆11Oct 14, 2025Updated 6 months ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 12 years ago
- Advanced information gathering & OSINT tool for phone numbers.☆13Oct 9, 2020Updated 5 years ago
- ☆12Jun 10, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Automatic bot for like the posts of your destination tag on Instagram to gain real followers☆18Oct 21, 2025Updated 6 months ago
- ☆10Oct 5, 2019Updated 6 years ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- Kernel Wi-Fi/Bluetooth driver for the Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro and Pixel Fold.☆17Sep 3, 2025Updated 8 months ago
- ☆13Sep 10, 2024Updated last year
- 👨🏼💻 Brute force wifi passwords with AppleScript.☆14Jan 7, 2020Updated 6 years ago
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- go-utils☆12Nov 22, 2025Updated 5 months ago
- Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities☆23Oct 16, 2025Updated 6 months ago
- SPAM ANDROID AS WELL AS IPHONE USERS WITH CALL FLOODING........☆16Sep 10, 2020Updated 5 years ago
- This is a fork of Linux, for various purposes.☆16Feb 20, 2024Updated 2 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- The modified bcmon from google code☆11Aug 23, 2022Updated 3 years ago