j3ssie / pymetasploitLinks
A full-fledged msfrpc library for Metasploit framework.
☆13Updated 8 years ago
Alternatives and similar repositories for pymetasploit
Users that are interested in pymetasploit are comparing it to the libraries listed below
Sorting:
- TXT and PDF documents from the NSA☆15Updated 10 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- pen testing scripts☆12Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated 9 months ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Updated 6 years ago
- Simple script to download some missing tools in Kali☆34Updated 4 years ago
- Automated Mass Exploiter☆12Updated 6 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17Updated 6 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆19Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Collections of way to evade normal detection events.☆25Updated 4 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆34Updated 7 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15Updated 5 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Tools and scripts dedicated to Android application security☆49Updated 4 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆30Updated 8 years ago