Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes resource handler files.
☆44Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for payday
Users that are interested in payday are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Aug 31, 2016Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆352Jan 12, 2023Updated 3 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- A script that parses nmap.xml output, identifies all SSL services and automatically performs an sslscan of each service☆14Jul 2, 2025Updated 8 months ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆206Sep 6, 2018Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆380Apr 13, 2017Updated 8 years ago
- Penetration testing on windows(7 or 8)☆25Oct 21, 2020Updated 5 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- ☆34Jan 31, 2016Updated 10 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- ARCANUS is a customized payload generator/handler.☆145Feb 27, 2018Updated 8 years ago
- A unified console to perform the "kill chain" stages of attacks.☆208Jul 15, 2023Updated 2 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- ☆15Aug 31, 2020Updated 5 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆512Jan 8, 2017Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- Undetectable Windows Payload Generation☆1,609Nov 8, 2022Updated 3 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- Dependencies for Veil 3☆18Feb 7, 2017Updated 9 years ago
- Simple TOR Socks Proxy Container☆13Jun 8, 2016Updated 9 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆532Nov 4, 2016Updated 9 years ago