nullbind / Metasploit-Modules
This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some have not.
☆17Updated 9 years ago
Alternatives and similar repositories for Metasploit-Modules:
Users that are interested in Metasploit-Modules are comparing it to the libraries listed below
- ☆80Updated last year
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- tools for analyzing strings from password lists☆58Updated 2 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Linux setup tool for Kali Linux☆78Updated 6 years ago
- Automated enumeration☆30Updated 3 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 5 years ago
- ☆52Updated 11 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆45Updated 4 years ago
- ☆47Updated 9 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Small scripts to assist in pentesting☆19Updated 4 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- Easy Window domain access☆51Updated 11 years ago
- OSCP Scripts☆14Updated 9 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago