maldevel / exploitationLinks
Software exploitation training material
☆15Updated 8 years ago
Alternatives and similar repositories for exploitation
Users that are interested in exploitation are comparing it to the libraries listed below
Sorting:
- Various exploits☆10Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Notes on offensive training☆16Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- pentest toolbox☆28Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- ☆15Updated 2 years ago
- A full-fledged msfrpc library for Metasploit framework.☆8Updated 8 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- MS17-010☆12Updated 7 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Framework for Man-In-The-Middle attacks☆16Updated 7 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- ☆82Updated last year
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 6 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 8 months ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago