Metasploit Framework
☆40Jul 25, 2016Updated 9 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- CVE-2019-2725 bypass pocscan and exp☆11Jun 21, 2019Updated 6 years ago
- routersploit的扩展,一个exploit设置多个目标并同时检测多个目标,结合网络空间搜索引擎搜索目标,统计检测结果并保存☆18Feb 28, 2019Updated 7 years ago
- Expweb project is a php+python based on the development of bulk getshell scanning platform. ----------------------QQ Group:485281743☆20Aug 18, 2015Updated 10 years ago
- 过各waf注入上传等☆25Mar 23, 2018Updated 7 years ago
- based on Angle Sword☆31Apr 23, 2021Updated 4 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 6 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 9 years ago
- 《Ruby 基础教程(第5版)》☆10Jan 12, 2018Updated 8 years ago
- IATHook 测试例子☆10Jan 8, 2020Updated 6 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Shell script for testing the SSL/TLS Protocols☆33Aug 30, 2017Updated 8 years ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Security Research☆94Jul 2, 2025Updated 8 months ago
- Modified version of usbmux/tcprelay python wrapper and script to add support for multiple attached devices☆12May 7, 2013Updated 12 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 25, 2026Updated last week
- ☆11Jun 22, 2020Updated 5 years ago
- IRB Drawing Interface☆14Dec 11, 2019Updated 6 years ago
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆13Nov 1, 2023Updated 2 years ago
- 工控态势感知工具 Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks…☆10Sep 10, 2017Updated 8 years ago
- linux lcx☆11Jul 18, 2016Updated 9 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Project is about research of sahara 2 protocol (Qualcomm devices) - especially msm8909 chipset that is being used in Huawei Y560, Lumia 5…☆13Oct 15, 2016Updated 9 years ago
- ☆14Mar 8, 2021Updated 4 years ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 4 months ago
- 汉化了2.0部分界面,利用深度学习方法检测恶意程序☆13Jul 6, 2022Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- Palestra sobre desenvolvimento seguro de imagens e containers para a DockerCon 2021 sala Brasil☆10May 27, 2021Updated 4 years ago
- K8 Deep dive - Core Concepts, CRDs, Operators, Controllers, Openshift, kubebuilder, Coreos operator framework☆10May 1, 2023Updated 2 years ago
- ☆10Apr 21, 2025Updated 10 months ago
- A video-sharing web platform compatible with NextShare, a peer-to-peer streaming technology developed within European project P2P-Next☆15Nov 13, 2012Updated 13 years ago
- A C++ tool for decrypting the Switch's flash memory (public domain, thanks to rajkosto for providing guidance)☆11Apr 30, 2018Updated 7 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago