lattera / metasploit
☆31Updated 12 years ago
Related projects ⓘ
Alternatives and complementary repositories for metasploit
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- Script to automate, manage, and multithread Nikto scans.☆58Updated 4 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- Malicious Link Blog☆24Updated last year
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 8 years ago
- ☆75Updated last year
- collection of pentest tools☆24Updated 5 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆16Updated 9 years ago
- Ruby script for spoofing SMTP emails.☆43Updated last year
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 9 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 4 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 7 years ago
- Search drives for documents containing passwords☆62Updated 10 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆12Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆74Updated 10 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆43Updated 9 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 4 years ago
- ☆47Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆48Updated 8 years ago
- tools for analyzing strings from password lists☆56Updated 2 years ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆8Updated 5 years ago