lattera / metasploitLinks
☆31Updated 13 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below
Sorting:
- Script to automate, manage, and multithread Nikto scans.☆61Updated 5 years ago
- ☆82Updated last year
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- collection of pentest tools☆24Updated 6 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 10 years ago
- One-off scripts☆52Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- ☆17Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- My collection of nmap nse modules☆64Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 5 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Ruby script for spoofing SMTP emails.☆43Updated 2 years ago
- ☆18Updated last year
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with over 50+ …☆30Updated last week
- Search drives for documents containing passwords☆63Updated 11 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆80Updated 7 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- scripts for pentesting☆89Updated 7 years ago
- ☆15Updated 2 years ago