eviltik / msfnodeLinks
Metasploit rpc api wrapper (nodejs)
☆46Updated 9 years ago
Alternatives and similar repositories for msfnode
Users that are interested in msfnode are comparing it to the libraries listed below
Sorting:
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆393Updated 10 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- A collection of exploits for different VoIP products.☆261Updated last month
- OpenSSH remote DOS exploit and vulnerable container☆53Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 7 years ago
- XSS exploitation tool - access victims through HTTP proxy☆160Updated 11 years ago
- ☆17Updated 10 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- An untraceable keylogger built from scratch in C++☆42Updated 9 years ago
- A malware/botnet analysis framework written in Ruby.☆196Updated last year
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13Updated 9 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- Openssh backdoor found with a ssh honeypot☆28Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A curated list of rootkits found on Github and other sites.☆64Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- A simple and effective phpmyadmin honeypot☆67Updated 7 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 8 years ago