Metasploit Framework
☆20Mar 24, 2026Updated 3 weeks ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 4 years ago
- ☆14Jun 27, 2016Updated 9 years ago
- ☆12Nov 25, 2020Updated 5 years ago
- Encrypt your password or decrypt your hash. Multiple algorithms supported.☆19Feb 1, 2017Updated 9 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆44Nov 27, 2023Updated 2 years ago
- ☆35Aug 3, 2017Updated 8 years ago
- ☆38Apr 29, 2020Updated 5 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆87Dec 12, 2017Updated 8 years ago
- ☆13Jan 20, 2020Updated 6 years ago
- Traffic monitor for your VPN☆28Jul 18, 2016Updated 9 years ago
- Simple Rubber Ducky for Arduino 32U4 boards☆12Jan 23, 2018Updated 8 years ago
- Remote control retroshare-nogui from your Android device☆35Sep 4, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- control de asistencia de una escuela☆11May 21, 2017Updated 8 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- Tool to deploy a post-exploitation prompt at any time☆323May 28, 2021Updated 4 years ago
- Distrubición Linux para Osint☆58Sep 9, 2018Updated 7 years ago
- 💸 A smart contract that facilitates the payout of funds (via dividend) to investors.☆11Dec 12, 2017Updated 8 years ago
- Script to extract a signature of the first blocks of the disk, to be able to dectect boot tampering attemps.☆10Jul 8, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- jQuery plugin to create a circle Path-like menu☆15Oct 27, 2015Updated 10 years ago
- the code that powers Wikicoding, the wikipedia of code.☆11Apr 5, 2017Updated 9 years ago
- Detects malware trying to send logs to a email☆16Feb 24, 2023Updated 3 years ago
- Autoit code obfuscation.☆16Sep 14, 2016Updated 9 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Flask Dashboard - Shards Design | AppSeed☆16Oct 4, 2023Updated 2 years ago
- Ransomeware attack in linux☆15Aug 12, 2018Updated 7 years ago
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- Docker gunicorn server base image source☆11Oct 12, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Customized docker images generation toolkit☆25Oct 14, 2021Updated 4 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Joomla! Framework, based in Bootstrap 3.x 100% with Bootswatch styles.☆12Feb 24, 2020Updated 6 years ago
- Small utility to generate complicated passwords - version with GUI☆19Nov 19, 2017Updated 8 years ago
- Simple log parsing example in Python☆14Oct 7, 2015Updated 10 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago