lattera / metasploitLinks
☆31Updated 13 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below
Sorting:
- ☆84Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Ruby script for spoofing SMTP emails.☆44Updated 2 years ago
- collection of pentest tools☆25Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Android and iOS source for the Empire mobile app☆90Updated 6 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Reconnaissance scripts for penetration testing☆59Updated 10 years ago
- Ruby based reverse IP-lookup tool.☆56Updated 5 years ago
- scripts for pentesting☆86Updated 7 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 8 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Bash Bunny fun!☆53Updated 7 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 5 years ago
- ☆24Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- Simple Karma Attack☆68Updated 5 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37Updated 10 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Shell-style script to search exploit-db.com exploits.☆61Updated last year
- ssh session type for metasploit☆101Updated 2 years ago
- My collection of nmap nse modules☆64Updated 6 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆43Updated 4 years ago