lattera / metasploitLinks
☆31Updated 13 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below
Sorting:
- Ruby script for spoofing SMTP emails.☆44Updated 2 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- ☆84Updated 2 years ago
- scripts for pentesting☆86Updated 7 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Updated 7 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 8 years ago
- A Script to Convert Debian Linux into Kali Linux☆55Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 5 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆48Updated 9 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- Self contained htaccess shells and attacks☆16Updated 7 years ago
- A module for the WiFi Pineapple to facilitate the PMKID attack.☆54Updated 3 years ago
- Android and iOS source for the Empire mobile app☆90Updated 6 years ago
- Use Tor for anonymous scanning with nmap☆91Updated 10 years ago
- ☆17Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- ssh session type for metasploit☆101Updated 3 years ago
- My collection of nmap nse modules☆64Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Simple Karma Attack☆68Updated 5 years ago
- ☆57Updated 5 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Updated 9 years ago