pwnwiki / qView external linksLinks
Exploit Pack for Metasploit - Collection of modules gathered across time and internets
☆247Aug 12, 2014Updated 11 years ago
Alternatives and similar repositories for q
Users that are interested in q are comparing it to the libraries listed below
Sorting:
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 10 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Unofficial Kali Documentation Project☆159Feb 27, 2015Updated 10 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- Post Exploitation Collection☆1,571May 1, 2020Updated 5 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Apr 22, 2015Updated 10 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47May 27, 2017Updated 8 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- PwnWiki - The notes section of the pentesters mind.☆565Oct 22, 2018Updated 7 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 10 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Feb 11, 2012Updated 14 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Jul 2, 2020Updated 5 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- ☆38May 31, 2017Updated 8 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆409Jul 14, 2016Updated 9 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Jun 5, 2017Updated 8 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆688Oct 27, 2016Updated 9 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago