dhondta / python-sploitkit
Devkit for building Metasploit-like consoles
☆246Updated 8 months ago
Alternatives and similar repositories for python-sploitkit:
Users that are interested in python-sploitkit are comparing it to the libraries listed below
- Toolkit for implant attack of IoT devices☆134Updated 6 years ago
- A multiple reverse shell session/client manager via terminal☆243Updated last year
- Reverse Shell Cheat Sheet TooL☆293Updated 4 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆327Updated 6 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆324Updated 2 years ago
- fireELF - Fileless Linux Malware Framework☆662Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Updated 2 years ago
- DNS-Shell is an interactive Shell over DNS channel☆523Updated 4 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆170Updated 4 years ago
- Pip install exploit package☆158Updated 6 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆449Updated 4 years ago
- Search Exploitable Software on Linux☆226Updated last year
- Only Hitting PoC [Tested on Windows Server 2008 r2]☆128Updated 5 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- EmbedOS - Embedded security testing virtual machine☆155Updated 4 years ago
- Some useful scripts for CobaltStrike☆842Updated 4 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆362Updated last year
- Simple python backdoor with Ngrok tunnel support☆203Updated last year
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- Search an exploit in the local exploitdb database by its CVE☆169Updated 2 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆247Updated 3 years ago
- Multiplatform reverse shell generator☆583Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆593Updated 3 years ago
- ☆468Updated last year
- office-exploits Office漏洞集合 https://www.sec-wiki.com☆424Updated 6 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆136Updated 5 years ago
- Linux post exploitation privilege escalation enumeration☆256Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆373Updated 3 years ago