Metasploit Exploiting Tool For Linux
☆21Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for MSF-EXPLOIT
Users that are interested in MSF-EXPLOIT are comparing it to the libraries listed below
Sorting:
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Jul 4, 2020Updated 5 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 9 months ago
- Weaponize Sailfish OS with Kali linux☆12Jan 15, 2020Updated 6 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Metasploit Multi Purpose Exploiting Toolkit For Termux☆31Sep 23, 2021Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Who We Are☆22Sep 6, 2024Updated last year
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- DESFire Shell☆15Feb 12, 2026Updated 3 weeks ago
- Unified repository for different Metasploit Framework payloads☆23Oct 25, 2017Updated 8 years ago
- Discord client zero-click RCE☆40Aug 25, 2021Updated 4 years ago
- androrat☆22Nov 6, 2019Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and saf…☆26Aug 14, 2020Updated 5 years ago
- ALAT TOLL KEPERLUAN ONLINE☆13Jan 10, 2019Updated 7 years ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆22Aug 2, 2025Updated 7 months ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆26Sep 6, 2024Updated last year
- ☆19Jun 26, 2017Updated 8 years ago
- HOW TO FIX THE MISSING FIRMWARE OR THE NONFREE FIRMWARE AFTER KALI-LINUX INSTALLATION☆38Sep 25, 2018Updated 7 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Private api to get session cookie of google account, login by email, password and some recovery option☆14Jan 8, 2019Updated 7 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year