nipunjaswal / Mastering-MetasploitView external linksLinks
Metasploit Modules from Mastering Metasploit Book
☆20May 23, 2018Updated 7 years ago
Alternatives and similar repositories for Mastering-Metasploit
Users that are interested in Mastering-Metasploit are comparing it to the libraries listed below
Sorting:
- Metasploit Installer By Mr.IM81☆22Nov 18, 2019Updated 6 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- Metasploit Exploiting Tool For Linux☆21Sep 27, 2021Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Mar 28, 2022Updated 3 years ago
- ☆84Oct 8, 2023Updated 2 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆12Oct 26, 2021Updated 4 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆34Jun 1, 2021Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 8 years ago
- This repository provides examples that demonstrates how to develop PSoC 4 MCU based analog designs. These examples help you to use periph…☆15Oct 27, 2018Updated 7 years ago
- SUNBURST DGA decoder☆11Dec 23, 2020Updated 5 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- sms-hacker using metasploit☆41Feb 17, 2017Updated 8 years ago
- PhishGen is a penetration testing and red teaming tool that automates the process of generating email addresses using names scraped from …☆44Jul 5, 2019Updated 6 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- An OCaml implementation of the DPLL algorithm for solving SAT instances. Uses nothing beyond the OCaml List library.☆19Sep 5, 2014Updated 11 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- u-blox Linux Kernel repository☆12Jan 29, 2016Updated 10 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- Weaponize Sailfish OS with Kali linux☆12Jan 15, 2020Updated 6 years ago
- r6rs packaging of minikanren from "The Reasoned Schemer"☆12Apr 22, 2015Updated 10 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- A tool to locate people using social engineering.☆11Mar 13, 2022Updated 3 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- heuristically and dynamically sample (more) uniformly from large decision trees of unknown shape☆14Jul 20, 2025Updated 6 months ago
- Restore iOS devices without updating via rootfilesystem DMG☆10Nov 9, 2018Updated 7 years ago