lattera / metasploit
☆31Updated 12 years ago
Alternatives and similar repositories for metasploit:
Users that are interested in metasploit are comparing it to the libraries listed below
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 6 years ago
- This repo contains Powershell scripts used for general hackery.☆8Updated 9 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- scripts for pentesting☆87Updated 6 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- collection of pentest tools☆24Updated 5 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Malicious Link Blog☆24Updated last year
- Search drives for documents containing passwords☆62Updated 10 years ago
- We see a light at the end of the tunnel☆11Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Small scripts to assist in pentesting☆19Updated 4 years ago
- ☆15Updated 2 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆12Updated 10 years ago
- A collection of tools for every PENTEST engagement☆12Updated 5 years ago