Metasploit Framework
☆20May 8, 2017Updated 8 years ago
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 4 years ago
- ☆14Jun 27, 2016Updated 9 years ago
- ☆12Nov 25, 2020Updated 5 years ago
- Encrypt your password or decrypt your hash. Multiple algorithms supported.☆19Feb 1, 2017Updated 9 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- ☆19Feb 21, 2015Updated 11 years ago
- ☆35Aug 3, 2017Updated 8 years ago
- A Firefox plugin that allows you to choose easily between different DNS over HTTPS servers☆12Apr 28, 2020Updated 5 years ago
- ☆16May 22, 2017Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆86Dec 12, 2017Updated 8 years ago
- Guía introductoria a la escritura de exploits☆70Mar 2, 2021Updated 5 years ago
- ☆11May 5, 2015Updated 10 years ago
- Simple Rubber Ducky for Arduino 32U4 boards☆12Jan 23, 2018Updated 8 years ago
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 7 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- 💸 A smart contract that facilitates the payout of funds (via dividend) to investors.☆11Dec 12, 2017Updated 8 years ago
- Script to extract a signature of the first blocks of the disk, to be able to dectect boot tampering attemps.☆10Jul 8, 2016Updated 9 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- jQuery plugin to create a circle Path-like menu☆15Oct 27, 2015Updated 10 years ago
- Flask Dashboard - Material Dark Design | AppSeed☆14Oct 4, 2023Updated 2 years ago
- A library that makes developing Swing applications on Jython much less painful☆16Jan 23, 2018Updated 8 years ago
- the code that powers Wikicoding, the wikipedia of code.☆11Apr 5, 2017Updated 8 years ago
- This is a Telegram bot designed to back up messages and media files from Telegram chats to a local file system and a SQLite database. It …☆14Aug 20, 2024Updated last year
- Scrypt PoW Cryptocurrency Template - Resurrected from Barcoin☆14Dec 10, 2013Updated 12 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- Detects malware trying to send logs to a email☆16Feb 24, 2023Updated 3 years ago
- Autoit code obfuscation.☆16Sep 14, 2016Updated 9 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Flask Dashboard - Shards Design | AppSeed☆16Oct 4, 2023Updated 2 years ago
- Ransomeware attack in linux☆15Aug 12, 2018Updated 7 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- Docker gunicorn server base image source☆11Oct 12, 2014Updated 11 years ago