NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)
☆49May 16, 2017Updated 8 years ago
Alternatives and similar repositories for RC-exploiter
Users that are interested in RC-exploiter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Nov 25, 2016Updated 9 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Dec 9, 2019Updated 6 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆41Sep 6, 2015Updated 10 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- Plugins for Metasploit Framework☆485Jan 18, 2019Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- Scripts that are useful for me on pen tests☆538Jun 8, 2022Updated 3 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Cronbased Dirty Cow Exploit☆30Jan 30, 2017Updated 9 years ago
- Some of my Nmap scripts☆22Aug 3, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Automatically exported from code.google.com/p/sergio-proxy☆51Mar 15, 2015Updated 11 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆35Aug 24, 2022Updated 3 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆936May 28, 2025Updated 10 months ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆301May 5, 2016Updated 9 years ago