kgretzky / metasploit-payloadsLinks
Unified repository for different Metasploit Framework payloads
☆21Updated 8 years ago
Alternatives and similar repositories for metasploit-payloads
Users that are interested in metasploit-payloads are comparing it to the libraries listed below
Sorting:
- The state of the art network attack and monitoring framework.☆16Updated 7 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Updated 8 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆58Updated 8 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 3 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆23Updated 7 months ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16Updated 6 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19Updated 5 years ago
- Automated Mass Exploiter☆11Updated 6 years ago
- WiFi-Jammer/DoS toolset☆62Updated 5 years ago
- Automated Password Cracking Tool☆17Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- pen testing scripts☆12Updated 4 years ago
- The WiFi Penetration Toolkit☆30Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- simple script to pwn android phone with physical access☆26Updated 6 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Updated 7 years ago
- Awesome-Cellular-Hacking☆69Updated 4 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆73Updated 2 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 5 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Updated 3 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆30Updated 6 years ago
- Crack your non-rooted android device pin code with 100% guarantee aslong as usb debugging has been enable. Wbruter also has support for p…☆14Updated 6 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Updated 3 years ago
- Camera Hack bot - Powered by XPH4N70M☆21Updated 2 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆30Updated 6 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆86Updated 11 months ago
- Keylogger for ethical hackers☆13Updated 4 years ago