lattera / metasploitLinks
☆31Updated 13 years ago
Alternatives and similar repositories for metasploit
Users that are interested in metasploit are comparing it to the libraries listed below
Sorting:
- ☆82Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- scripts for pentesting☆88Updated 7 years ago
- Ruby script for spoofing SMTP emails.☆45Updated 2 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 10 years ago
- ☆24Updated 9 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Self contained htaccess shells and attacks☆15Updated 7 years ago
- Simple Karma Attack☆69Updated 5 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 10 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 8 years ago
- Massive arsenal of hacker tools...☆80Updated 8 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆96Updated 5 years ago
- Rogue Access Point Detector☆37Updated last year
- ☆17Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆85Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 6 years ago