Metasploit exploit suggester using OpenVAS XML output
☆18Jun 30, 2018Updated 7 years ago
Alternatives and similar repositories for msfsuggester
Users that are interested in msfsuggester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Dec 16, 2020Updated 5 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 11 years ago
- ☆16May 22, 2015Updated 10 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- A set of vulnerable PHP scripts used to test w3af's vulnerability detection features.☆28Apr 15, 2015Updated 10 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Javascript library fuzzer. Tries to detect functions which may lead to XSS vulnerabilities if untrusted data is passed to said functions.☆16Oct 6, 2020Updated 5 years ago
- 0-ring rootkit revealer for Linux☆29Sep 5, 2019Updated 6 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago