metasploit / framework1Links
Archive of Metasploit Framework v1 (Perl)
☆13Updated 11 years ago
Alternatives and similar repositories for framework1
Users that are interested in framework1 are comparing it to the libraries listed below
Sorting:
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Cobalt Strike SCT payload obfuscator☆143Updated 8 years ago
- ☆210Updated 7 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆172Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆242Updated 2 years ago
- The full story of the CLR implementation of Meterpreter☆153Updated 5 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 11 months ago
- A simple, extensible C&C beaconing system.☆102Updated 7 years ago
- Malleable C2 profiles for Cobalt Strike☆75Updated 3 years ago
- A collection of useful scripts for Cobalt Strike☆172Updated last year
- Exports Kerberos KrbCred Tickets for use in Mimikatz/Beacon from a Kerberos CCache File☆89Updated 10 years ago
- Miscellaneous projects related to attacking Windows.☆197Updated 11 years ago
- ☆35Updated 9 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆290Updated 8 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Updated 8 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Updated 7 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Updated 9 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- initial commit☆174Updated 7 years ago
- This Dockerfile builds a Debian-based Docker container with Metasploit-Framework installed. A quick and easy way to deploy Metasploit on…☆100Updated last year
- Custom THP Dropper☆26Updated 7 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Updated 8 years ago
- cve-2019-0604 SharePoint RCE exploit☆101Updated 6 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Updated 5 years ago
- CVE-2019-0604☆133Updated 6 years ago
- checkO365 is a tool to check if a target domain is using O365☆87Updated 7 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆116Updated 9 years ago