Devkit for building Metasploit-like consoles
☆256Oct 1, 2025Updated 6 months ago
Alternatives and similar repositories for python-sploitkit
Users that are interested in python-sploitkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Drone pentesting framework console☆1,921Nov 23, 2024Updated last year
- Devkit for quickly creating client bots for remote communications☆15Jun 17, 2025Updated 10 months ago
- Cron-like system based on Nextdoor Scheduler, PyBots and Tinyscript☆15Dec 3, 2023Updated 2 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆931Dec 27, 2022Updated 3 years ago
- ARP Exploitation in Python☆11Feb 19, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39May 16, 2019Updated 6 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- ☆128May 22, 2023Updated 2 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆35Jan 22, 2025Updated last year
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 7 years ago
- for mass exploiting☆613Jul 14, 2022Updated 3 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Adversary simulation and Red teaming platform with AI☆5,033Mar 31, 2026Updated 3 weeks ago
- CVE-2020-8515-PoC☆14Mar 30, 2020Updated 6 years ago
- CVE-2017-13089☆56Nov 15, 2017Updated 8 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.☆3,840Feb 28, 2025Updated last year
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- Interactive Network Scanner☆1,040Oct 21, 2020Updated 5 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- PhEmail is a python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering…☆347Sep 16, 2019Updated 6 years ago
- Windows Exploit Suggester - Next Generation☆4,828Updated this week
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,466Jan 20, 2025Updated last year
- Auto Root Exploit Tool☆535Jun 15, 2023Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- A tool to dump the login password from the current linux user☆4,098Sep 5, 2025Updated 7 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Scanner for CVE-2020-0796 - SMBv3 RCE☆716Oct 1, 2020Updated 5 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago