mr2tone / metasploit-webappLinks
Metasploit framework via HTTP services
☆10Updated 4 years ago
Alternatives and similar repositories for metasploit-webapp
Users that are interested in metasploit-webapp are comparing it to the libraries listed below
Sorting:
- Linux and Windows Hardening Points☆12Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- Evil snippets of Underhanded Red Team tactics☆11Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 8 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 9 years ago
- Port scanning and domain utility.☆30Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- SWF Vulnerability & Information Scanner☆19Updated 7 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Useful Windows and AD tools☆15Updated 3 years ago