kgretzky / metasploit-payloadsLinks
Unified repository for different Metasploit Framework payloads
☆19Updated 7 years ago
Alternatives and similar repositories for metasploit-payloads
Users that are interested in metasploit-payloads are comparing it to the libraries listed below
Sorting:
- The state of the art network attack and monitoring framework.☆15Updated 7 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆22Updated 2 months ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 5 years ago
- Automated Password Cracking Tool☆18Updated 4 years ago
- Hacking Tools For All Debian-based OS☆51Updated 7 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆26Updated 4 years ago
- Simple script for the WHID injector - a rubberducky wifi☆108Updated last year
- ☆17Updated 7 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆48Updated 2 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆52Updated 2 years ago
- Awesome-Cellular-Hacking☆68Updated 3 years ago
- Radio Signals Recognition Manual☆26Updated 2 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆70Updated 2 years ago
- Camera Hack bot - Powered by XPH4N70M☆18Updated 2 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆82Updated 6 months ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆13Updated 3 years ago
- Complete and modifyable ransomware program☆11Updated 4 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆57Updated 2 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆18Updated 6 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 4 years ago
- Android-PIN-Bruteforce☆18Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- Automated Mass Exploiter☆12Updated 6 years ago