opsxcq / docker-metasploitLinks
Metasploit framework with steroids
☆58Updated 3 years ago
Alternatives and similar repositories for docker-metasploit
Users that are interested in docker-metasploit are comparing it to the libraries listed below
Sorting:
- A wrapper for Nmap to quickly run network scans☆147Updated 5 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆154Updated 6 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- fork of http://code.google.com/p/dnsmap/source/checkout☆115Updated 8 years ago
- This Dockerfile builds a Debian-based Docker container with Metasploit-Framework installed. A quick and easy way to deploy Metasploit on…☆100Updated last year
- An implementation of NSA's ExplodingCan exploit in Python☆269Updated 8 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Updated 5 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- An interactive multi-user web JS shell☆366Updated 3 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 7 years ago
- an asynchronous target enumeration tool☆245Updated 3 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆121Updated 7 years ago
- BadUSB in Routers☆199Updated 3 years ago
- Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with t…☆20Updated 8 years ago
- ☆73Updated 6 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116Updated 5 years ago
- Bodhi - Client-side Vulnerability Playground☆122Updated 4 years ago
- ☆43Updated last year
- Automate Metasploit scanning and exploitation☆116Updated 5 months ago
- Reverse Shell Cheat Sheet TooL☆299Updated 5 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- Tool made to automate tasks of pentesting.☆165Updated 6 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆222Updated last year