This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some have not.
☆17Jan 25, 2016Updated 10 years ago
Alternatives and similar repositories for Metasploit-Modules
Users that are interested in Metasploit-Modules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Media Player Classic Qute Theater☆12Apr 20, 2016Updated 10 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- android_tools_iw☆13Apr 1, 2024Updated 2 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Sep 27, 2018Updated 7 years ago
- Resize, manipulate and organize your desktop windows☆18Mar 2, 2026Updated 2 months ago
- A collection of Nmap NSE scripts.☆44Mar 9, 2017Updated 9 years ago
- A Wordpress exploitation toolkit☆15Nov 22, 2017Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 10 years ago
- ☆10Sep 28, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Kali Nethunter for any android device since from kitkat and upper☆15Aug 10, 2017Updated 8 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- ☆12Nov 12, 2021Updated 4 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆13Sep 17, 2025Updated 8 months ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆11May 10, 2024Updated 2 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66May 16, 2024Updated 2 years ago
- Kali NetHunter Install Tools☆17Dec 29, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆11Dec 25, 2020Updated 5 years ago
- Save and download all favorite images from website in an easy way.☆11Jul 26, 2017Updated 8 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- All things related to sp_CheckTempdb☆22Apr 30, 2026Updated 2 weeks ago
- ☆11Oct 17, 2020Updated 5 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 11 years ago
- Study into generating POC / Exploits for the metasploit framework using LLMs☆13Aug 27, 2023Updated 2 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 9 months ago
- Validate Swedish personal identity numbers☆16May 12, 2026Updated last week
- ☆13Nov 11, 2020Updated 5 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago