darkoperator / Metasploit-PluginsLinks
Plugins for Metasploit Framework
☆470Updated 6 years ago
Alternatives and similar repositories for Metasploit-Plugins
Users that are interested in Metasploit-Plugins are comparing it to the libraries listed below
Sorting:
- Post Exploitation Wiki☆527Updated 5 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆297Updated 10 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆510Updated 7 years ago
- Pipal, THE password analyser☆654Updated 2 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆600Updated 10 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Updated 8 years ago
- Micro$oft Windows Hacking Pack☆524Updated 7 years ago
- A ton of helpful tools☆343Updated 4 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,114Updated 8 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Updated 7 years ago
- Windows Pentest Scripts☆233Updated 7 years ago
- Smart Install Exploitation Tool☆588Updated 3 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆446Updated 2 years ago
- ☆403Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆574Updated last year
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆166Updated 7 years ago
- ☆209Updated 7 years ago
- Scripts that are useful for me on pen tests☆537Updated 3 years ago
- Automatically exported from code.google.com/p/creddump☆272Updated 6 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Updated 9 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- PowerShell Helper Tool☆150Updated 10 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆504Updated 5 years ago
- Personal Collection of Operating Systems Scripts☆568Updated last year
- A Powershell Privilege Escalation Enumeration Script.☆313Updated 7 years ago
- Easy 802.1Q VLAN Hopping☆383Updated 9 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆545Updated 2 months ago
- Check for valid credentials across a network over SMB☆268Updated last year