This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some have not.
☆17Jan 25, 2016Updated 10 years ago
Alternatives and similar repositories for Metasploit-Modules
Users that are interested in Metasploit-Modules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 11 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- A Wordpress exploitation toolkit☆15Nov 22, 2017Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 10 years ago
- ☆10Sep 28, 2014Updated 11 years ago
- Kali Nethunter for any android device since from kitkat and upper☆15Aug 10, 2017Updated 8 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆11May 10, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66May 16, 2024Updated last year
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Demonstrates how Android Marshmallow permissions dialog can be hijacked by the app drawind on top of it.☆27Jan 20, 2016Updated 10 years ago
- Study into generating POC / Exploits for the metasploit framework using LLMs☆13Aug 27, 2023Updated 2 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 8 months ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 11 years ago
- Some works on Nmap Scripts (NSE)☆89Jun 2, 2024Updated last year
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- Risu is Nessus parser, that converts the generated reports into a ActiveRecord database, this allows for easy report generation and vulne…☆63Apr 3, 2026Updated 3 weeks ago
- A collection of PHP scripts useful for penetration testers working in a PHP environment.☆14Apr 4, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Efficient and advanced man in the middle framework☆23May 18, 2020Updated 5 years ago
- Integrates Xanitizer results into SonarQube☆21Aug 5, 2021Updated 4 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Provides security information about your PHP environment and offers suggestions based on PhpSecInfo from the PHP Security Consortium.☆24Apr 19, 2026Updated last week
- Use InSpec to run through the configurations from the OpenStack Security Guide.☆20Aug 7, 2024Updated last year