hasherezade / metasploit_modulesLinks
My metasploit modules
☆23Updated 9 years ago
Alternatives and similar repositories for metasploit_modules
Users that are interested in metasploit_modules are comparing it to the libraries listed below
Sorting:
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆20Updated 10 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆41Updated 6 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- meterpreter connetion☆22Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- NCC Group Ransomware Simulator☆69Updated 9 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Updated 2 years ago
- Nano meterpreter shell based on TinyMet☆28Updated 8 years ago
- ☆19Updated 8 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 9 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Create custom Windows batch files from a configuration file☆32Updated 8 years ago
- MS15-076 Privilege Escalation☆16Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Updated 9 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Data exfiltration PoC scripts☆25Updated 9 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 8 years ago
- Mimikatz HashClash☆12Updated 10 years ago