martinvigo / metasploit-frameworkLinks
Metasploit Framework
☆29Updated 9 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Python OSINT Tool to retrieve information from Skype☆76Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- Rogue AP killer☆90Updated 7 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆52Updated 6 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- Searches various online resources to try and get as much info about an IP/domain as possible.☆99Updated 11 years ago
- Hacker OPSEC☆96Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 2 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Updated 5 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 6 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 10 years ago
- An opensource project similar to HoneyDocs☆26Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- Anti-Anti-Automation Framework☆98Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago