dhondta / python-sploitkitLinks
Devkit for building Metasploit-like consoles
☆251Updated 3 weeks ago
Alternatives and similar repositories for python-sploitkit
Users that are interested in python-sploitkit are comparing it to the libraries listed below
Sorting:
- Reverse Shell Cheat Sheet TooL☆298Updated 5 years ago
- Search an exploit in the local exploitdb database by its CVE☆172Updated 2 years ago
- Python-Based Pentesting CLI Tool☆84Updated 2 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆334Updated 6 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆169Updated 5 years ago
- Automation library for Metasploit☆400Updated 3 months ago
- Simple python backdoor with Ngrok tunnel support☆206Updated last year
- A multiple reverse shell session/client manager via terminal☆242Updated 2 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 5 years ago
- Toolkit for implant attack of IoT devices☆136Updated 7 years ago
- 💊 Solana sniper, copy trading, volume,HFT/LFT market maker on Raydium & Pump. Solana trading bot for pump.fun, bonk.fun, letsbonk toke…☆161Updated last month
- Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.☆180Updated 5 years ago
- Search Exploitable Software on Linux☆232Updated 2 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆329Updated 2 years ago
- A multi threads web application source leak scanner☆392Updated 4 months ago
- A quick and dirty python script to embed a Metasploit generated APK file into another APK for fun.☆144Updated 2 years ago
- PENIOT: Penetration Testing Tool for IoT☆226Updated 3 years ago
- Pip install exploit package☆156Updated 6 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆369Updated last year
- Bluekeep(CVE 2019-0708) exploit released☆106Updated 6 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆346Updated 4 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆250Updated 4 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆375Updated last year
- Social Engineering Tool☆190Updated 7 years ago
- A list of useful payloads for Web Application Security and Pentest/CTF☆310Updated last year
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 5 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Updated 6 years ago
- Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)☆135Updated 6 years ago