jlxip / MermaidLinks
Generate customized and undetectable exploits for Metasploit.
☆24Updated 8 years ago
Alternatives and similar repositories for Mermaid
Users that are interested in Mermaid are comparing it to the libraries listed below
Sorting:
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Arp spoof detection tool☆24Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Automatically exported from code.google.com/p/surfjack - not actively maintained☆9Updated 10 years ago
- Password cracking utility☆53Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Software exploitation training material☆15Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago