metasploit / framework2
Archive of Metasploit Framework v2 (Perl)
☆15Updated 10 years ago
Alternatives and similar repositories for framework2:
Users that are interested in framework2 are comparing it to the libraries listed below
- Archive of Metasploit Framework v1 (Perl)☆11Updated 10 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- ☆20Updated 6 years ago
- ☆14Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- ☆30Updated 8 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- ☆10Updated 2 weeks ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- ☆15Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 7 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 9 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 5 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago