opsxcq / docker-metasploitLinks
Metasploit framework with steroids
☆58Updated 3 years ago
Alternatives and similar repositories for docker-metasploit
Users that are interested in docker-metasploit are comparing it to the libraries listed below
Sorting:
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆156Updated 6 years ago
- This Dockerfile builds a Debian-based Docker container with Metasploit-Framework installed. A quick and easy way to deploy Metasploit on…☆100Updated last year
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 5 years ago
- Linux Privilege Escalation Tool☆186Updated 6 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- BadUSB in Routers☆198Updated 3 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Updated 7 years ago
- Masscan integrated with Shodan API☆44Updated 8 years ago
- Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with t…☆20Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- ☆73Updated 6 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Extensible Red Team Framework☆112Updated 6 years ago
- Operational Security utility and automator.☆142Updated 5 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Game of Thrones hacking CTF (Capture the flag)☆64Updated 11 months ago
- ProFTPD IAC Remote Root Exploit☆37Updated 8 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆121Updated 7 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 6 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Updated 7 years ago
- A simple exploit to execute system command on codiad☆65Updated 7 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116Updated 5 years ago
- Automate Metasploit scanning and exploitation☆117Updated 6 months ago
- ☆58Updated 5 years ago
- Wavestone's web interface for password cracking with hashcat☆171Updated 4 years ago
- Using IPv6 to Bypass Security☆92Updated 5 months ago