iam1980 / metasploit-vps-installer
Metasploit installer for Debian (Jessie) VPS.
☆25Updated 7 years ago
Alternatives and similar repositories for metasploit-vps-installer:
Users that are interested in metasploit-vps-installer are comparing it to the libraries listed below
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- ☆20Updated 8 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago