metasploit / framework1Links
Archive of Metasploit Framework v1 (Perl)
☆13Updated 10 years ago
Alternatives and similar repositories for framework1
Users that are interested in framework1 are comparing it to the libraries listed below
Sorting:
- Archive of Metasploit Framework v2 (Perl)☆16Updated 10 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆13Updated 4 years ago
- Exploit framework written in Go☆29Updated 7 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Rex library for dealing with Powershell Scripts☆53Updated 2 months ago
- Phishing toolkit for red teams and pentesters.☆125Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Rex library for various exploitation helpers☆22Updated 2 months ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- extracts urls from text☆16Updated 7 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- the puppy proxy☆22Updated 5 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- The Rex Socket Abstraction Library☆12Updated last month
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Rex library for text generation and manipulation☆21Updated 3 months ago
- Take a word list and convert 1337 spellings back to normal☆12Updated 7 years ago
- BitBender is a byte manipulation tool☆12Updated 7 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago