lattera / metasploitLinks
☆31Updated 13 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below
Sorting:
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- collection of pentest tools☆24Updated 5 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Software exploitation training material☆15Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- Malicious Link Blog☆25Updated last year
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 11 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- ☆24Updated 9 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Rogue Access Point Detector☆36Updated 9 months ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Ruby script for spoofing SMTP emails.☆43Updated 2 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆8Updated 6 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago