dhondta / python-sploitkitLinks
Devkit for building Metasploit-like consoles
β250Updated 2 months ago
Alternatives and similar repositories for python-sploitkit
Users that are interested in python-sploitkit are comparing it to the libraries listed below
Sorting:
- Reverse Shell Cheat Sheet TooLβ296Updated 5 years ago
- π Solana sniper, copy trading, volume,HFT/LFT market maker on Raydium & Pump. Solana trading bot for pump.fun, bonk.fun, letsbonk tokeβ¦β155Updated last week
- Automation library for Metasploitβ397Updated last month
- Python-Based Pentesting CLI Toolβ85Updated 2 years ago
- A multiple reverse shell session/client manager via terminalβ242Updated 2 years ago
- An Exploit framework for Web Vulnerabilities written in Pythonβ170Updated 5 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.β332Updated 6 years ago
- Pip install exploit packageβ157Updated 6 years ago
- Toolkit for implant attack of IoT devicesβ135Updated 6 years ago
- Bluekeep(CVE 2019-0708) exploit releasedβ105Updated 5 years ago
- Simple python backdoor with Ngrok tunnel supportβ205Updated last year
- Search an exploit in the local exploitdb database by its CVEβ174Updated 2 years ago
- Social Engineering Toolβ190Updated 7 years ago
- PoC for triggering buffer overflow via CVE-2020-0796β329Updated 2 years ago
- Search Exploitable Software on Linuxβ231Updated 2 years ago
- A quick and dirty python script to embed a Metasploit generated APK file into another APK for fun.β145Updated 2 years ago
- DNS-Shell is an interactive Shell over DNS channelβ527Updated 4 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppoβ¦β375Updated last year
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linuxβ125Updated 6 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.β250Updated 3 years ago
- PENIOT: Penetration Testing Tool for IoTβ224Updated 3 years ago
- Linux post exploitation privilege escalation enumerationβ258Updated 5 years ago
- Bypassing WAF by abusing SSL/TLS Ciphersβ318Updated 4 years ago
- Kerberos Exploitation Kitβ152Updated 10 years ago
- A tool to generate obfuscated one liners to aid in penetration testingβ179Updated 6 years ago
- Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.β178Updated 5 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It usesβ¦β142Updated 6 years ago
- Auto Root Exploit Toolβ533Updated 2 years ago
- Simple linux backdoors and hiding techniquesβ212Updated 7 years ago
- unix SSH post-exploitation 1337 toolβ137Updated 6 years ago