mr2tone / metasploit-webappLinks
Metasploit framework via HTTP services
☆10Updated 4 years ago
Alternatives and similar repositories for metasploit-webapp
Users that are interested in metasploit-webapp are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆53Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 15 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Updated 13 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Updated 2 years ago
- Windows Privesc Check☆20Updated 11 years ago
- Enumerate subdomains through Virustotal☆32Updated 6 years ago
- ☆11Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- ☆26Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago