Clone of Metasploit's wiki w/ additions
☆17Nov 22, 2015Updated 10 years ago
Alternatives and similar repositories for metasploitwiki
Users that are interested in metasploitwiki are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 8 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Athc0n 2012 CTF setups☆15Mar 12, 2015Updated 11 years ago
- Collection of useful scripts.☆78Sep 4, 2022Updated 3 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Homemade scripts to-do various vulnerable challenges☆79Jan 7, 2021Updated 5 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- A tool for securing communications between a client and a DNS resolver☆21May 26, 2015Updated 10 years ago
- Php Codz Hacking☆21Sep 5, 2015Updated 10 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Feb 11, 2012Updated 14 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆14Aug 6, 2013Updated 12 years ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆101Mar 17, 2026Updated last week
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆10Aug 9, 2018Updated 7 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 4 years ago
- Burp extension that checks for interesting and security headers☆44Aug 12, 2020Updated 5 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- compile your JavaScript to native code in pure JavaScript☆19Mar 24, 2022Updated 4 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- Repository holding all alternatives of *nix backdoors.☆150Jun 19, 2015Updated 10 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago