☆31Jun 19, 2012Updated 13 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Where a Linux sys-admin's perinoid scripts are collected.☆10Feb 3, 2016Updated 10 years ago
- Remote adb Executor Library☆15Apr 7, 2014Updated 12 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆34Sep 15, 2024Updated last year
- Rapid7 Metasploit API client library written in Ruby☆26Feb 13, 2025Updated last year
- WStalker: an easy proxy☆25May 5, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 10 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Analyze a real-time IPv4 packet stream and export metrics about the data flows☆14Jan 29, 2020Updated 6 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆15Mar 21, 2022Updated 4 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A library to handle Apple Property List format in binary or XML☆18Feb 11, 2012Updated 14 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆24Jan 21, 2024Updated 2 years ago
- Replacement for the old Unix crypt☆16Sep 17, 2019Updated 6 years ago
- Spy on your friend Android App☆13Feb 13, 2017Updated 9 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- More simple and convenient C++ library to manipulate json and plist, maybe better than libplist.☆18Apr 14, 2026Updated last month
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Stupid simple XOR encryption utility☆33Oct 3, 2025Updated 7 months ago
- ☆16Feb 10, 2020Updated 6 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- Restores firmware and filesystem to iPhone/iPod Touch☆12Jun 7, 2010Updated 15 years ago
- A library to handle Apple Property List format whereas it's binary or XML☆53Aug 23, 2010Updated 15 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆14Nov 5, 2020Updated 5 years ago
- Andrwes Scripting Center☆17Mar 7, 2019Updated 7 years ago
- ☆15Jul 6, 2015Updated 10 years ago
- USB Flashing Format (UF2) JavaScript Library☆14Jan 21, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Apr 21, 2019Updated 7 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- Tested Ducky script payloads for USB Rubber Ducky☆14Nov 7, 2020Updated 5 years ago