fpr1m3 / go-msf-rpcLinks
Go API Client for Metasploit RPC API
☆18Updated 3 weeks ago
Alternatives and similar repositories for go-msf-rpc
Users that are interested in go-msf-rpc are comparing it to the libraries listed below
Sorting:
- Tool scan EternalBlue by golang☆22Updated 5 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Shellcode process injector☆27Updated 5 years ago
- ☆33Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- ☆20Updated 6 years ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- Linux AV tests☆13Updated 6 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Package that provides different PE tricks to difficult the reverse engineering of your Windows applications.☆11Updated 5 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- Is this IP a C2 server?☆28Updated 5 years ago
- DNS server for pentesters☆49Updated 3 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- Hacky linux memory probe. Yara or Regex scan process memory☆11Updated 2 weeks ago
- The best way to send emails in Go.☆10Updated 4 years ago
- ☆18Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- ☆19Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- CVE-2020-0688 PoC☆11Updated 7 months ago
- Chrome cookie dumper☆17Updated 4 years ago
- ☆50Updated 4 years ago
- post exploitation user monitoring tool☆20Updated 6 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week