dhondta / python-sploitkitLinks
Devkit for building Metasploit-like consoles
☆248Updated last month
Alternatives and similar repositories for python-sploitkit
Users that are interested in python-sploitkit are comparing it to the libraries listed below
Sorting:
- Reverse Shell Cheat Sheet TooL☆296Updated 5 years ago
- EternalBlue Metasploit Port to various Windows Versions from Windows XP SP2 up to Windows 10 Pro☆150Updated 6 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆328Updated 2 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆330Updated 6 years ago
- Python-Based Pentesting CLI Tool☆83Updated 2 years ago
- A multiple reverse shell session/client manager via terminal☆242Updated 2 years ago
- Simple python backdoor with Ngrok tunnel support☆205Updated last year
- Automation library for Metasploit☆394Updated this week
- Toolkit for implant attack of IoT devices☆134Updated 6 years ago
- Pip install exploit package☆157Updated 6 years ago
- Bluekeep(CVE 2019-0708) exploit released☆105Updated 5 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆250Updated 3 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆170Updated 4 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script☆209Updated 4 years ago
- Search an exploit in the local exploitdb database by its CVE☆173Updated 2 years ago
- Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.☆176Updated 5 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- 👻Impost3r -- A linux password thief☆641Updated 4 months ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Updated 6 years ago
- Linux post exploitation privilege escalation enumeration☆257Updated 4 years ago
- CVE-2020-5902 BIG-IP☆373Updated 3 years ago
- A list of useful payloads for Web Application Security and Pentest/CTF☆305Updated 11 months ago
- PENIOT: Penetration Testing Tool for IoT☆223Updated 3 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆376Updated last year
- Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)☆133Updated 6 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- Hershell is a simple TCP reverse shell written in Go.☆531Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago