Unified repository for different Metasploit Framework payloads
☆22Oct 25, 2017Updated 8 years ago
Alternatives and similar repositories for metasploit-payloads
Users that are interested in metasploit-payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The state of the art network attack and monitoring framework.☆16Mar 5, 2018Updated 8 years ago
- Short script to decode output logs of *sslsplit* raw HTTP packets.☆17Aug 12, 2016Updated 9 years ago
- ☆13Apr 22, 2015Updated 10 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- Capturing Passwords With sslstrip From Network When You Are Connected☆11Feb 27, 2016Updated 10 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆26Aug 2, 2025Updated 7 months ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆16Jul 12, 2021Updated 4 years ago
- Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.☆543Jul 14, 2019Updated 6 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆28Jan 7, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- HackRF software and captures by everyone and for everyone. Argh matey.☆15Oct 7, 2022Updated 3 years ago
- Network Tools☆34Nov 28, 2023Updated 2 years ago
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆26Jan 18, 2017Updated 9 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Go API Client for Metasploit RPC API☆18May 23, 2025Updated 10 months ago
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago
- ☆13May 24, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆354Jun 18, 2024Updated last year
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 5 years ago
- Unofficial Android Mobile app to rule all Flipper's family☆30Aug 19, 2023Updated 2 years ago
- A tool finding sub-domains for penetesters☆58Dec 3, 2020Updated 5 years ago
- Learn to develop mobile applications from zero to deployment with these in-depth guides and sample application☆10Dec 7, 2022Updated 3 years ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- PowerShell to EXE converter☆82Nov 12, 2023Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- BruteMailer is a python3 tool for hacking different email services' user accounts such as Gmail,outlook through bruteforcing, it also com…☆12Jun 18, 2025Updated 9 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Bad Apple in 65kB or bust.☆48Dec 29, 2025Updated 3 months ago
- Angular UI component that represents an international payment card☆10Jan 7, 2024Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆37Feb 14, 2017Updated 9 years ago
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago