r00t-3xp10it / RC-exploiterView external linksLinks
NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)
☆49May 16, 2017Updated 8 years ago
Alternatives and similar repositories for RC-exploiter
Users that are interested in RC-exploiter are comparing it to the libraries listed below
Sorting:
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Nov 25, 2016Updated 9 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Dec 9, 2019Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 7 years ago
- DefCon24☆122Sep 2, 2016Updated 9 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Some of my Nmap scripts☆22Aug 3, 2017Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Scripts that are useful for me on pen tests☆538Jun 8, 2022Updated 3 years ago
- Homemade scripts to-do various vulnerable challenges☆78Jan 7, 2021Updated 5 years ago
- My pentest cheat sheet☆15Apr 27, 2017Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆874Dec 28, 2018Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Jul 13, 2020Updated 5 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- A collection off SVG for Home Assistant☆13Apr 25, 2025Updated 9 months ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago
- Plugins for Metasploit Framework☆478Jan 18, 2019Updated 7 years ago