Meterpreter Scripts that I'm working on
☆171Jan 28, 2019Updated 7 years ago
Alternatives and similar repositories for Meterpreter-Scripts
Users that are interested in Meterpreter-Scripts are comparing it to the libraries listed below
Sorting:
- Plugins for Metasploit Framework☆478Jan 18, 2019Updated 7 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- PowerShell Module with Security cmdlets for security work☆448Feb 27, 2020Updated 6 years ago
- Post Exploitation Wiki☆525Dec 18, 2019Updated 6 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆143Aug 9, 2015Updated 10 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Apr 13, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- ☆84Oct 8, 2023Updated 2 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆686Oct 27, 2016Updated 9 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆248Aug 12, 2014Updated 11 years ago
- Metasploit modules that didn't make it into trunk for some reason or the other☆118Jun 17, 2017Updated 8 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Malicious Macro Generator☆828Apr 17, 2019Updated 6 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆366Dec 14, 2014Updated 11 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Specify targets and run sets of tools against them☆386Apr 23, 2019Updated 6 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago