defcon-russia / metasploit-frameworkView external linksLinks
Metasploit Framework
☆31Jan 30, 2020Updated 6 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- Unified repository for different Metasploit Framework payloads☆49Jan 30, 2020Updated 6 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- CVE-2017-7269 to webshell or shellcode loader☆88May 16, 2017Updated 8 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Security Capture the Flag Platform☆33Jan 11, 2023Updated 3 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后门扫描…☆14Aug 29, 2015Updated 10 years ago
- ☆17Dec 1, 2019Updated 6 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Jan 21, 2017Updated 9 years ago
- Python版简单的Linux数据包嗅探器☆16Aug 11, 2016Updated 9 years ago
- Assembly API block that uses CRC32 for resolving Windows API function addresses☆18May 19, 2023Updated 2 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 6 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- AggressorScript-RunDumpHash☆19Oct 9, 2019Updated 6 years ago
- Web Application Fingerprinting Mindmap☆17Jun 19, 2017Updated 8 years ago
- ☆22Mar 5, 2018Updated 7 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)☆22Aug 31, 2018Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 7 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Jun 25, 2020Updated 5 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 5 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆233May 30, 2019Updated 6 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last week
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Sep 14, 2024Updated last year
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago