darkoperator / Metasploit-Plugins
Plugins for Metasploit Framework
☆449Updated 6 years ago
Alternatives and similar repositories for Metasploit-Plugins:
Users that are interested in Metasploit-Plugins are comparing it to the libraries listed below
- A unique automated LFi Exploiter with Bind/Reverse Shells☆278Updated 9 years ago
- Post Exploitation Wiki☆518Updated 5 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆575Updated 10 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Updated 7 years ago
- A ton of helpful tools☆336Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆285Updated 5 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆442Updated last year
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 6 years ago
- Scripts that are useful for me on pen tests☆528Updated 2 years ago
- Micro$oft Windows Hacking Pack☆520Updated 7 years ago
- Windows Pentest Scripts☆230Updated 7 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 10 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆976Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- Empire client application☆496Updated 3 years ago
- A Powershell Privilege Escalation Enumeration Script.☆309Updated 7 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆561Updated 11 months ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆450Updated 9 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆446Updated 7 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆276Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Updated 7 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆533Updated 3 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆313Updated 4 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449Updated 2 years ago
- Collection of different exploits☆182Updated 4 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Remote Recon and Collection☆450Updated 7 years ago
- ☆210Updated 6 years ago