dhondta / python-sploitkitLinks
Devkit for building Metasploit-like consoles
☆248Updated last week
Alternatives and similar repositories for python-sploitkit
Users that are interested in python-sploitkit are comparing it to the libraries listed below
Sorting:
- A multiple reverse shell session/client manager via terminal☆242Updated last year
- Reverse Shell Cheat Sheet TooL☆296Updated 5 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆250Updated 3 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆330Updated 6 years ago
- Automation library for Metasploit☆392Updated last year
- Toolkit for implant attack of IoT devices☆134Updated 6 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆328Updated 2 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆453Updated 4 years ago
- Multiplatform reverse shell generator☆587Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆204Updated last year
- Search an exploit in the local exploitdb database by its CVE☆172Updated 2 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆266Updated 2 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆171Updated 4 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Updated 3 years ago
- tools☆544Updated 6 years ago
- Bypassing WAF by abusing SSL/TLS Ciphers☆317Updated 3 years ago
- Pip install exploit package☆158Updated 6 years ago
- Some useful scripts for CobaltStrike☆847Updated 4 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- Network Pivoting Toolkit☆448Updated last year
- ☆472Updated last year
- Resources to help get started with IoT Pentesting☆168Updated 6 years ago
- A WebSocket C2 Tool☆398Updated 7 years ago
- Kerberos Exploitation Kit☆151Updated 10 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆376Updated last year