Devkit for building Metasploit-like consoles
☆258Oct 1, 2025Updated 7 months ago
Alternatives and similar repositories for python-sploitkit
Users that are interested in python-sploitkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Drone pentesting framework console☆1,943Nov 23, 2024Updated last year
- Devkit for quickly building CLI tools with Python☆55Mar 22, 2026Updated last month
- Devkit for quickly creating client bots for remote communications☆15Jun 17, 2025Updated 11 months ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆17May 2, 2022Updated 4 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆930Dec 27, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ARP Exploitation in Python☆11Feb 19, 2017Updated 9 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39May 16, 2019Updated 7 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- ☆128May 22, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- ☆35Jan 22, 2025Updated last year
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 7 years ago
- for mass exploiting☆614Jul 14, 2022Updated 3 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Adversary simulation and Red teaming platform with AI☆5,043Mar 31, 2026Updated last month
- CVE-2020-8515-PoC☆14Mar 30, 2020Updated 6 years ago
- CVE-2017-13089☆56Nov 15, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 9 months ago
- pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.☆3,843Feb 28, 2025Updated last year
- CobaltStrike External C2 for Websockets☆196Jul 16, 2019Updated 6 years ago
- Interactive Network Scanner☆1,040Oct 21, 2020Updated 5 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Windows Exploit Suggester - Next Generation☆4,845May 8, 2026Updated last week
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,466Jan 20, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Auto Root Exploit Tool☆535Jun 15, 2023Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- A tool to dump the login password from the current linux user☆4,118Sep 5, 2025Updated 8 months ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆718Oct 1, 2020Updated 5 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago