dhondta / python-sploitkitLinks
Devkit for building Metasploit-like consoles
☆252Updated 3 months ago
Alternatives and similar repositories for python-sploitkit
Users that are interested in python-sploitkit are comparing it to the libraries listed below
Sorting:
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆335Updated 6 years ago
- Automation library for Metasploit☆406Updated 6 months ago
- Reverse Shell Cheat Sheet TooL☆300Updated 5 years ago
- Python-Based Pentesting CLI Tool☆87Updated 3 years ago
- Search an exploit in the local exploitdb database by its CVE☆171Updated 3 years ago
- Toolkit for implant attack of IoT devices☆137Updated 7 years ago
- Bluekeep(CVE 2019-0708) exploit released☆106Updated 6 years ago
- A multiple reverse shell session/client manager via terminal☆244Updated 2 years ago
- Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.☆182Updated 6 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆248Updated 4 years ago
- 💊 Solana sniper, copy trading, volume,HFT/LFT market maker on Raydium & Pump. Solana trading bot for pump.fun, bonk.fun, letsbonk toke…☆169Updated last month
- Pip install exploit package☆157Updated 7 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆168Updated 5 years ago
- DNS-Shell is an interactive Shell over DNS channel☆528Updated 5 years ago
- PENIOT: Penetration Testing Tool for IoT☆228Updated 3 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆330Updated 2 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆347Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆207Updated 2 years ago
- SonicWall SSL-VPN Exploit☆183Updated 4 years ago
- Linux post exploitation privilege escalation enumeration☆258Updated 5 years ago
- Bypassing WAF by abusing SSL/TLS Ciphers☆319Updated 4 years ago
- Search Exploitable Software on Linux☆234Updated 2 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆376Updated last year
- An extensible application for penetration testers and software developers to decode/encode data into various formats.☆105Updated last year
- Simple linux backdoors and hiding techniques☆212Updated 8 years ago
- Network footprint scanner platform. Discover domains and run your custom checks periodically.☆426Updated 3 years ago
- A quick and dirty python script to embed a Metasploit generated APK file into another APK for fun.☆144Updated 2 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Updated 6 years ago
- Kerberos Exploitation Kit☆159Updated 11 years ago
- Social Engineering Tool☆189Updated 7 years ago