dhondta / python-sploitkitLinks
Devkit for building Metasploit-like consoles
☆250Updated last month
Alternatives and similar repositories for python-sploitkit
Users that are interested in python-sploitkit are comparing it to the libraries listed below
Sorting:
- Automation library for Metasploit☆395Updated 3 weeks ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆330Updated 6 years ago
- Reverse Shell Cheat Sheet TooL☆296Updated 5 years ago
- Python-Based Pentesting CLI Tool☆85Updated 2 years ago
- Toolkit for implant attack of IoT devices☆135Updated 6 years ago
- PENIOT: Penetration Testing Tool for IoT☆224Updated 3 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆328Updated 2 years ago
- Search an exploit in the local exploitdb database by its CVE☆174Updated 2 years ago
- Bluekeep(CVE 2019-0708) exploit released☆105Updated 5 years ago
- A multiple reverse shell session/client manager via terminal☆242Updated 2 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆170Updated 5 years ago
- A quick and dirty python script to embed a Metasploit generated APK file into another APK for fun.☆145Updated 2 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo …☆375Updated last year
- An extensible application for penetration testers and software developers to decode/encode data into various formats.☆106Updated last year
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆250Updated 3 years ago
- Pip install exploit package☆157Updated 6 years ago
- Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.☆178Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆205Updated last year
- Resources to help get started with IoT Pentesting☆168Updated 6 years ago
- Nishang - PowerShell for penetration testing and offensive security.https://github.com/samratashok/nishang/blob/master/Gather/Invoke-SSID…☆35Updated 7 years ago
- Linux post exploitation privilege escalation enumeration☆257Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script☆210Updated 4 years ago
- 👻Impost3r -- A linux password thief☆644Updated 5 months ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆691Updated 4 years ago
- SonicWall SSL-VPN Exploit☆176Updated 4 years ago
- Bypassing WAF by abusing SSL/TLS Ciphers☆318Updated 4 years ago