kgretzky / metasploit-payloadsLinks
Unified repository for different Metasploit Framework payloads
☆19Updated 7 years ago
Alternatives and similar repositories for metasploit-payloads
Users that are interested in metasploit-payloads are comparing it to the libraries listed below
Sorting:
- The state of the art network attack and monitoring framework.☆15Updated 7 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆48Updated 2 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Automated Password Cracking Tool☆17Updated 4 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 5 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16Updated 6 years ago
- Awesome-Cellular-Hacking☆68Updated 4 years ago
- Hacking Tools For All Debian-based OS☆51Updated 7 years ago
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆53Updated 2 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆26Updated 6 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- This repo contains tools that hackers use for penetration testing and web hacking, DNS spoofing, MiTM, malware and more. It's made easy j…☆20Updated 3 years ago
- Hacking tools. IP fortune, webmap -- web vulns scanner, rtsp brute+fuzz, and more.☆41Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆72Updated 2 years ago
- Simple script to download some missing tools in Kali☆34Updated 4 years ago
- Automated Mass Exploiter☆12Updated 6 years ago
- Keylogger using pynput + mail sender☆54Updated 4 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Radio Signals Recognition Manual☆26Updated 2 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆18Updated 6 years ago
- Run you Localhost Server☆21Updated 10 months ago
- Small social engineering tool written in python2☆20Updated 9 months ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 5 years ago
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20Updated 3 months ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆58Updated 2 years ago