kgretzky / metasploit-payloads
Unified repository for different Metasploit Framework payloads
β19Updated 7 years ago
Alternatives and similar repositories for metasploit-payloads:
Users that are interested in metasploit-payloads are comparing it to the libraries listed below
- The state of the art network attack and monitoring framework.β13Updated 7 years ago
- !!!WORLD'S π #1π₯ TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most toβ¦β46Updated 2 years ago
- β17Updated 7 years ago
- Automated Password Cracking Toolβ16Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.β37Updated 2 years ago
- A swiss army knife for pentesting networksβ20Updated 2 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victimβ18Updated 4 years ago
- Run you Localhost Serverβ18Updated 6 months ago
- Hack Cameras CCTV FREEβ16Updated 3 years ago
- Simple script to bulk check if IPs match networksβ12Updated 3 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakesβ26Updated 4 years ago
- π₯Ready, Aim, Fire.π₯β16Updated 2 years ago
- Repository of tools used in my blogβ51Updated last year
- Keylogger for ethical hackersβ15Updated 3 years ago
- Python RAT with reverse connection and asymmetric encrypted communicationsβ16Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14Updated 6 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Toolsβ18Updated 4 years ago
- Hax is a mini-tool with really useful hacking tools.β18Updated last year
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.β23Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be usβ¦β52Updated 7 years ago
- π Devploit v 2.3 Information Gathering Toolπ΅οΈβ14Updated 6 years ago
- Camera Hack bot - Powered by XPH4N70Mβ18Updated last year
- It's easy to use android botnet work without port forwarding, vps and android studioβ10Updated 3 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commandsβ¦β40Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionalsβ35Updated 11 months ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.β75Updated 3 months ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcodeβ39Updated 6 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phishβ14Updated 4 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victimβ¦β16Updated 5 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform β¦β16Updated 5 years ago