darkoperator / Metasploit-PluginsLinks
Plugins for Metasploit Framework
☆451Updated 6 years ago
Alternatives and similar repositories for Metasploit-Plugins
Users that are interested in Metasploit-Plugins are comparing it to the libraries listed below
Sorting:
- A unique automated LFi Exploiter with Bind/Reverse Shells☆279Updated 9 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆575Updated 10 years ago
- Post Exploitation Wiki☆521Updated 5 years ago
- Micro$oft Windows Hacking Pack☆521Updated 7 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Updated 7 years ago
- A ton of helpful tools☆336Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- Scripts that are useful for me on pen tests☆530Updated 2 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆443Updated last year
- Collection of different exploits☆182Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 11 months ago
- Specify targets and run sets of tools against them☆389Updated 6 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆161Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 4 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 6 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- Windows Pentest Scripts☆231Updated 7 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 7 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆450Updated 9 years ago
- A Powershell Privilege Escalation Enumeration Script.☆311Updated 7 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆366Updated 10 months ago
- Metasploit AV Evasion Tool☆260Updated 9 years ago
- Check for valid credentials across a network over SMB☆262Updated last year
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆749Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,106Updated 7 years ago
- Linux post exploitation enumeration and exploit checking tools☆180Updated 5 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago