opsxcq / docker-metasploit
Metasploit framework with steroids
☆58Updated 2 years ago
Alternatives and similar repositories for docker-metasploit:
Users that are interested in docker-metasploit are comparing it to the libraries listed below
- archive of code from http://www.unicornscan.org/☆70Updated 12 years ago
- Search Exploitable Software on Linux☆223Updated last year
- Automate Metasploit scanning and exploitation☆113Updated 3 months ago
- Operational Security utility and automator.☆133Updated 4 years ago
- Various XSL templates to manipulate data from NMap XML reports☆26Updated 6 years ago
- ☆59Updated 4 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆118Updated 6 years ago
- Deploy payloads to *Nix systems en masse☆105Updated 4 years ago
- Linux privilege escalation via LXD☆132Updated 4 years ago
- A wrapper for Nmap to quickly run network scans☆146Updated 4 years ago
- SMB Relay Attack Script☆148Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linux☆85Updated 5 years ago
- rce exploit , made to work with pocsuite3☆120Updated 5 years ago
- A ready to work Kali Linux full metapackage Docker container☆73Updated last year
- The User Interface for GoCrack☆86Updated last month
- Nessus Scanner Docker Image☆59Updated 3 years ago
- Linux Privilege Escalation Tool☆181Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆110Updated 6 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 5 years ago
- Using IPv6 to Bypass Security☆94Updated last year
- Automating Jenkins Hacking using Shodan API☆94Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Updated 3 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- A JBoss script for obtaining remote shell access☆170Updated 4 years ago
- Linux pentest tools☆87Updated 5 years ago