Metasploit Exploiting Tool For Linux
☆21Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for MSF-EXPLOIT
Users that are interested in MSF-EXPLOIT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BASE OF A BASIC WHATSAPP BOT [ TERMUX / LINUX ]☆22Jul 25, 2021Updated 4 years ago
- Metasploit Multi Purpose Exploiting Toolkit For Termux☆33Sep 23, 2021Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆20Jul 4, 2020Updated 5 years ago
- Telegram Group Scrapper & Member Adder☆44Dec 29, 2021Updated 4 years ago
- Automated Phising Tool With Upto 45+ UptoDate Phising Templates & With a Inbuilt Url Masker☆122Nov 6, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 11 months ago
- Hydra In Termux☆83Jun 11, 2023Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 months ago
- Unified repository for different Metasploit Framework payloads☆22Oct 25, 2017Updated 8 years ago
- Discord client zero-click RCE☆40Aug 25, 2021Updated 4 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- An example of how you can use Azure API Management to implement a no token in the browser pattern for a JavaScript single-page applicatio…☆10Jul 8, 2025Updated 10 months ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- Metasploit Framework☆19Apr 6, 2020Updated 6 years ago
- A WiFi hacking Phishing tool for everyone.☆15Mar 31, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Turn your Kali Linux machine into a fully-functional 5 GHz WiFi Router☆12Nov 26, 2025Updated 5 months ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 5 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Feb 19, 2024Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- androrat☆22Nov 6, 2019Updated 6 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 5 years ago
- ADFS Brute-Force Login Script☆10Mar 19, 2024Updated 2 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆27Sep 6, 2024Updated last year
- A Python script to find tenant id an region from a list of domain names.☆21Jan 31, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Learn to develop mobile applications from zero to deployment with these in-depth guides and sample application☆10Dec 7, 2022Updated 3 years ago
- Who We Are☆22Sep 6, 2024Updated last year
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- PoC ransomware. Inspired by Mr. Robot☆10Jan 12, 2022Updated 4 years ago
- BruteMailer is a python3 tool for hacking different email services' user accounts such as Gmail,outlook through bruteforcing, it also com…☆13Jun 18, 2025Updated 10 months ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Imitating all commands in the Mr. Robot TV Series☆81Aug 14, 2015Updated 10 years ago