kgretzky / metasploit-payloads
Unified repository for different Metasploit Framework payloads
☆17Updated 7 years ago
Alternatives and similar repositories for metasploit-payloads:
Users that are interested in metasploit-payloads are comparing it to the libraries listed below
- The state of the art network attack and monitoring framework.☆13Updated 6 years ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆15Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆28Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- Hack Cameras CCTV FREE☆16Updated 3 years ago
- A swiss army knife for pentesting networks☆19Updated last year
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆9Updated 3 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆50Updated 7 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25Updated 2 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Subdomain crawler with wordlist using python☆12Updated 4 years ago
- ☆17Updated 7 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- simple script to pwn android phone with physical access☆23Updated 6 years ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 9 months ago
- A program that does Deauthentication Attack on every nearby wireless device☆25Updated 5 years ago
- Hacking tools. IP fortune, webmap -- web vulns scanner, rtsp brute+fuzz, and more.☆37Updated 3 years ago