Metasploit Framework
☆40Jul 25, 2016Updated 9 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2019-2725 bypass pocscan and exp☆11Jun 21, 2019Updated 6 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 10 years ago
- 信息安全竞赛练习系统是整合往届网络预选赛的真题以及官方样题和题库,以在线答题方式进行,比赛题型分为判断题、单选题和多选题。并且随机编排答案顺序,将成为备赛选手的好系统。☆28Oct 20, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 过各waf注入上传等☆25Mar 23, 2018Updated 8 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago
- Expweb project is a php+python based on the development of bulk getshell scanning platform. ----------------------QQ Group:485281743☆20Aug 18, 2015Updated 10 years ago
- Malice VirusTotal Plugin☆12Feb 24, 2019Updated 7 years ago
- Periodically scan target ranges using nmap, ndiff and emailing changes☆11Jan 13, 2017Updated 9 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Andrwes Scripting Center☆17Mar 7, 2019Updated 7 years ago
- Brute force doc/xls passwords☆13Feb 22, 2015Updated 11 years ago
- based on Angle Sword☆31Apr 23, 2021Updated 5 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Apr 3, 2016Updated 10 years ago
- ☆18Mar 28, 2015Updated 11 years ago
- linux lcx☆11Jul 18, 2016Updated 9 years ago
- Bro Live! A Bro training/learning environment.☆14Jul 21, 2015Updated 10 years ago
- ☆10Apr 21, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- checks site content against known good ssdeep hash, identifies matches☆10Jun 2, 2019Updated 6 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 11 years ago
- Docker script for OpenVAS with script for scan scan automation☆17Jul 15, 2024Updated last year
- ☆16Mar 10, 2017Updated 9 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- Saltstack formulae for installing logstash server with kibana and logstash shippers on your other machines☆19Nov 19, 2015Updated 10 years ago
- Salt Stack modules☆15Sep 26, 2015Updated 10 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Apr 4, 2022Updated 4 years ago
- sql盲注日志分析工具GUI版本☆16Feb 17, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Remote adb Executor Library☆15Apr 7, 2014Updated 12 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 10 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- IRB Drawing Interface☆14Dec 11, 2019Updated 6 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Dockerized cve-search as a web app☆16Dec 18, 2017Updated 8 years ago
- ☆11Jun 22, 2020Updated 5 years ago