Unified repository for different Metasploit Framework payloads
☆22Oct 25, 2017Updated 8 years ago
Alternatives and similar repositories for metasploit-payloads
Users that are interested in metasploit-payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The state of the art network attack and monitoring framework.☆17Mar 5, 2018Updated 8 years ago
- Python tool to inject DLLs into processes☆11Jun 29, 2017Updated 8 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 months ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆16Jul 12, 2021Updated 4 years ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- HackRF software and captures by everyone and for everyone. Argh matey.☆16Oct 7, 2022Updated 3 years ago
- Private api to get session cookie of google account, login by email, password and some recovery option☆15Jan 8, 2019Updated 7 years ago
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆26Jan 18, 2017Updated 9 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Generate Malicious QR or similar☆16Jun 7, 2023Updated 2 years ago
- Turn your Kali Linux machine into a fully-functional 5 GHz WiFi Router☆12Nov 26, 2025Updated 5 months ago
- ☆20Dec 20, 2023Updated 2 years ago
- Go API Client for Metasploit RPC API☆18May 23, 2025Updated 11 months ago
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago
- ☆14May 24, 2025Updated 11 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆358Jun 18, 2024Updated last year
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 5 years ago
- Unofficial Android Mobile app to rule all Flipper's family☆30Aug 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ADFS Brute-Force Login Script☆10Mar 19, 2024Updated 2 years ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆26Feb 27, 2025Updated last year
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆21Jan 31, 2025Updated last year
- Simple app to generate read-to-print Open Collective gift cards☆11Apr 29, 2020Updated 6 years ago
- Learn to develop mobile applications from zero to deployment with these in-depth guides and sample application☆10Dec 7, 2022Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- How to set up and install Ss7 and Sigtran Adapt☆37May 19, 2024Updated last year
- Access the query parameters of a URI, just like $_GET in PHP.☆18Jan 12, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Offensive web scanner: crawling, XSS, SQLi, headers and WAF bypass☆13Apr 20, 2026Updated 2 weeks ago
- Bad Apple in 65kB or bust.☆50Dec 29, 2025Updated 4 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆37Feb 14, 2017Updated 9 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Decode Flipper zero's raw .sub file (OOK, Manchester)☆28Aug 9, 2022Updated 3 years ago
- A script for installing custom patches in Ubuntu Touch devices.☆11Oct 7, 2025Updated 7 months ago