lattera / metasploitLinks
☆31Updated 13 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below
Sorting:
- ☆82Updated 2 years ago
- Ruby script for spoofing SMTP emails.☆46Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 10 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- ☆18Updated last year
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30Updated 10 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- ☆15Updated 2 years ago
- Massive arsenal of hacker tools...☆80Updated 8 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆22Updated 7 years ago
- My collection of nmap nse modules☆64Updated 6 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- Small backdoor using cookie.☆64Updated 9 years ago
- ☆17Updated 10 years ago
- Linux setup tool for Kali Linux☆79Updated 7 years ago
- Ruby based reverse IP-lookup tool.☆57Updated 5 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- Simple Karma Attack☆69Updated 5 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆91Updated last year
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- A collection of Nmap NSE scripts that I made.☆28Updated 12 years ago
- Search drives for documents containing passwords☆64Updated 11 years ago