This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some have not.
☆17Jan 25, 2016Updated 10 years ago
Alternatives and similar repositories for Metasploit-Modules
Users that are interested in Metasploit-Modules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 11 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Media Player Classic Qute Theater☆12Apr 20, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- A collection of Nmap NSE scripts.☆43Mar 9, 2017Updated 9 years ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- android_tools_iw☆13Apr 1, 2024Updated 2 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Sep 27, 2018Updated 7 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- ☆10Sep 28, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Kali Nethunter for any android device since from kitkat and upper☆15Aug 10, 2017Updated 8 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆11May 10, 2024Updated last year
- Kali NetHunter Install Tools☆17Dec 29, 2016Updated 9 years ago
- ☆16Mar 24, 2025Updated last year
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Save and download all favorite images from website in an easy way.☆11Jul 26, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- All things related to sp_CheckTempdb☆19Mar 31, 2026Updated last week
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 8 years ago
- Demonstrates how Android Marshmallow permissions dialog can be hijacked by the app drawind on top of it.☆27Jan 20, 2016Updated 10 years ago
- Study into generating POC / Exploits for the metasploit framework using LLMs☆13Aug 27, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- ☆13Nov 11, 2020Updated 5 years ago
- AlphaTracker is a computer vision pipeline with the practical and real-time advantages , which requires minimal hardware requirements and…☆13Jan 10, 2023Updated 3 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- sp_Blitz, sp_BlitzCache, sp_BlitzFirst, sp_BlitzIndex, and other SQL Server scripts for health checks and performance tuning.☆14Updated this week
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- Scripts and other methods to decrease windows 10 footprint on home PCs☆17Jul 24, 2018Updated 7 years ago