Metasploit Modules from Mastering Metasploit Book
☆20May 23, 2018Updated 7 years ago
Alternatives and similar repositories for Mastering-Metasploit
Users that are interested in Mastering-Metasploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wireless Forensics Framework In Python☆20Jan 29, 2017Updated 9 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Hands-On Network Forensics by Nipun Jaswal☆61Jun 26, 2023Updated 2 years ago
- ☆84Oct 8, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- Web accessible Ardour inside an Arch Container☆15Jan 2, 2026Updated 2 months ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Containerized Mopidy with every official plugin as well as popular extras. Spotify+Tunigo+Mopify+Spotimop, Google Music, dLeyna, Beets, P…☆22Jan 7, 2018Updated 8 years ago
- A system to help ship lisp code with C dependencies☆10Apr 29, 2018Updated 7 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- Todos los scripts y locuras del Blog SniferL4bs que sean desarrollados vendran en esta pequeña sección dedicada☆21Jun 22, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- SUNBURST DGA decoder☆11Dec 23, 2020Updated 5 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- A Clojure library designed to compress/decompress data.☆13Feb 4, 2020Updated 6 years ago
- NMAP扫描网络资产自动导入到Elasticstack进行展示☆11Apr 25, 2020Updated 5 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- A modified OCaml compiler for eliom programs☆10Jan 16, 2017Updated 9 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- Credentials recovery project☆13Dec 15, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 5 months ago
- AppImage bundled version xfreerdp with pass the hash function☆15Apr 17, 2018Updated 7 years ago
- Network based protocol fuzzer☆74Feb 17, 2022Updated 4 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆12Oct 26, 2021Updated 4 years ago
- A list of security courses at colleges and universities☆12Aug 9, 2017Updated 8 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- TLS Client Certificate Authentication and its Privacy Implications☆15Jul 25, 2017Updated 8 years ago
- 自己使用的一些脚本和工具☆15Sep 30, 2024Updated last year
- x86 16-bit program drawing the heart curve equation☆17Feb 15, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 从admin冲到TrustedInstaller☆17Feb 3, 2023Updated 3 years ago
- messing around writing reversing tools in clojure☆15Nov 9, 2017Updated 8 years ago
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- Gopher server written in Common Lisp☆14Nov 7, 2016Updated 9 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago