Unified repository for different Metasploit Framework payloads
☆22Oct 25, 2017Updated 8 years ago
Alternatives and similar repositories for metasploit-payloads
Users that are interested in metasploit-payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The state of the art network attack and monitoring framework.☆17Mar 5, 2018Updated 8 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆16Jul 12, 2021Updated 4 years ago
- Metasploit Exploiting Tool For Linux☆21Sep 27, 2021Updated 4 years ago
- Private api to get session cookie of google account, login by email, password and some recovery option☆15Jan 8, 2019Updated 7 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- Generate Malicious QR or similar☆16Jun 7, 2023Updated 2 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Workers AI Tool Calling Example☆26Jun 21, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Unofficial Android Mobile app to rule all Flipper's family☆30Aug 19, 2023Updated 2 years ago
- ☆19Aug 31, 2019Updated 6 years ago
- A Python script to find tenant id an region from a list of domain names.☆19Jan 31, 2025Updated last year
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- Learn to develop mobile applications from zero to deployment with these in-depth guides and sample application☆10Dec 7, 2022Updated 3 years ago
- Fingerprint Pro Use Cases☆27Mar 18, 2026Updated last month
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Access the query parameters of a URI, just like $_GET in PHP.☆18Jan 12, 2026Updated 3 months ago
- How to set up and install Ss7 and Sigtran Adapt☆36May 19, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- BruteMailer is a python3 tool for hacking different email services' user accounts such as Gmail,outlook through bruteforcing, it also com…☆12Jun 18, 2025Updated 10 months ago
- Escáner ofensivo web en Python: crawling, XSS, SQLi, headers y detección WAF con bypass por proveedor (--waf-xss).☆13Mar 25, 2026Updated 3 weeks ago
- Bad Apple in 65kB or bust.☆48Dec 29, 2025Updated 3 months ago
- Angular UI component that represents an international payment card☆10Jan 7, 2024Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- A GUI tool for Brute Force Login in a web page with Python, hack accounts on any website with a good dictionary of words. Also brute forc…☆28Apr 26, 2022Updated 3 years ago
- A custom Cards Against Humanity generator☆13May 16, 2024Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Decode Flipper zero's raw .sub file (OOK, Manchester)☆28Aug 9, 2022Updated 3 years ago
- A script for installing custom patches in Ubuntu Touch devices.☆11Oct 7, 2025Updated 6 months ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 6 months ago
- Go package that provides an implementation of the 0trace traceroute technique to determine the round trip time to a remote client.☆25Dec 18, 2023Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- اداه اختراق وايفاي wifi-hacker 《 جميع الحقوق محفوظة 》 تحتاج روت 《 محمد مهدي من سوريا 》 m313s@ Wifi paswoord wps/2 نبدأ بنسخ الاوامر ولصق…☆16Jan 29, 2021Updated 5 years ago
- Automated Phishing Tool☆12Aug 25, 2020Updated 5 years ago