fpr1m3 / go-msf-rpc
Go API Client for Metasploit RPC API
☆18Updated 3 years ago
Alternatives and similar repositories for go-msf-rpc:
Users that are interested in go-msf-rpc are comparing it to the libraries listed below
- ☆33Updated 4 years ago
- A golang library designed to interact with Metasploit☆43Updated 3 years ago
- ☆20Updated 6 years ago
- Tool scan EternalBlue by golang☆22Updated 5 years ago
- Utility to inject honey tokens into lsass.☆27Updated 8 years ago
- Shellcode process injector☆27Updated 4 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆21Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- Package that provides different PE tricks to difficult the reverse engineering of your Windows applications.☆11Updated 4 years ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- DNS server for pentesters☆49Updated 3 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆19Updated 3 years ago
- React UI☆11Updated 2 years ago
- CVE-2020-0688 PoC☆10Updated 4 months ago
- SSDP Service Discovery☆16Updated 6 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last week
- Small utility package for manipulating Windows process tokens☆26Updated 2 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆14Updated 5 years ago
- A Flexible Web Shell Client, Built on Electron☆13Updated 2 years ago
- ☆19Updated 4 years ago
- post exploitation user monitoring tool☆20Updated 6 years ago
- Leak windows system info through a docx file☆12Updated 5 years ago
- ☆16Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 5 years ago
- Hacky linux memory probe. Yara or Regex scan process memory☆11Updated last year
- A little implant which SSH's back with a shell☆36Updated 3 years ago