Metasploit Red Team Competition Modules
☆13Apr 10, 2011Updated 14 years ago
Alternatives and similar repositories for competition-modules
Users that are interested in competition-modules are comparing it to the libraries listed below
Sorting:
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- API for Rundeck to pull host data from Foreman☆11Oct 29, 2021Updated 4 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- Terraform & Packer code to create an up-to-date Kali Linux AWS EC2 instance☆16Jul 1, 2019Updated 6 years ago
- Prevents you from committing secrets and credentials into git repositories☆20May 8, 2020Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- Maintains backlink structure among interlinked Markdown notes☆11Dec 28, 2020Updated 5 years ago
- Plugins for Metasploit Framework☆485Jan 18, 2019Updated 7 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- Metasploit modules that didn't make it into trunk for some reason or the other☆118Jun 17, 2017Updated 8 years ago
- Per user SSHFS automount using user's SSH configuration☆17Apr 22, 2021Updated 4 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Lastest Hashcat rules for password cracking☆69Feb 7, 2026Updated last month
- Some exploits and exploit development stuff.☆153Feb 19, 2022Updated 4 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- Demodulate on/off keying☆27Dec 9, 2015Updated 10 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- ☆15Apr 12, 2018Updated 7 years ago
- An application for scraping information from radioreference.com☆14Mar 23, 2016Updated 9 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Back up your Simplenote account to a git repo or gist!☆13Dec 3, 2020Updated 5 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Oct 13, 2010Updated 15 years ago
- Released in 2003, saw the rise and fall of Google Reader, reached perfection in 2011☆14Aug 25, 2018Updated 7 years ago
- BigWhoop☆23Dec 5, 2015Updated 10 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year