isuruwa / MSF-EXPLOITView external linksLinks
Metasploit Exploiting Tool For Linux
☆21Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for MSF-EXPLOIT
Users that are interested in MSF-EXPLOIT are comparing it to the libraries listed below
Sorting:
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Jul 4, 2020Updated 5 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 9 months ago
- Weaponize Sailfish OS with Kali linux☆12Jan 15, 2020Updated 6 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- DESFire Shell☆15Jan 20, 2026Updated 3 weeks ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Who We Are☆21Sep 6, 2024Updated last year
- Metasploit Framework☆19Apr 6, 2020Updated 5 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Feb 19, 2024Updated last year
- Unified repository for different Metasploit Framework payloads☆23Oct 25, 2017Updated 8 years ago
- Discord client zero-click RCE☆39Aug 25, 2021Updated 4 years ago
- androrat☆22Nov 6, 2019Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and saf…☆27Aug 14, 2020Updated 5 years ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆20Aug 2, 2025Updated 6 months ago
- ALAT TOLL KEPERLUAN ONLINE☆13Jan 10, 2019Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆25Sep 6, 2024Updated last year
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- HOW TO FIX THE MISSING FIRMWARE OR THE NONFREE FIRMWARE AFTER KALI-LINUX INSTALLATION☆37Sep 25, 2018Updated 7 years ago
- Any presentation we've given at FortyNorth Security☆34Sep 27, 2021Updated 4 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago