☆31Jun 19, 2012Updated 13 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below
Sorting:
- ☆10Oct 12, 2021Updated 4 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 3 years ago
- ☆16Feb 10, 2020Updated 6 years ago
- NoSQL Injection Demo Application☆13Oct 18, 2013Updated 12 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Small script to determine valid immediate values for ARM assembly☆19Nov 25, 2019Updated 6 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 8 years ago
- Rapid7 Metasploit API client library written in Ruby☆24Feb 13, 2025Updated last year
- Documentation for knoXSS tool by @brutelogic☆29Jan 24, 2017Updated 9 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 6 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Dec 29, 2020Updated 5 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- ☆13Jul 13, 2011Updated 14 years ago
- Stupid simple XOR encryption utility☆34Oct 3, 2025Updated 5 months ago
- This software has been completely rewritten and published as CrystalReportsNinja☆11Aug 8, 2017Updated 8 years ago
- ☆85Feb 23, 2020Updated 6 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Aplikasi Sistem Informasi Rekam Medis berbasis Framework Laravel☆12Dec 15, 2023Updated 2 years ago
- phishing lock html php template☆13Apr 22, 2023Updated 2 years ago
- Oracle APEX Dynamic Action Plugin - Extend IG Menu☆13Oct 27, 2020Updated 5 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- ☆12Jul 4, 2024Updated last year
- Typescript common libraries and shared tooling☆11Updated this week
- A custom policy for Apigee, that creates time-limited Signed URLs for use with Google Cloud Storage.☆12May 23, 2024Updated last year