rajeshmajumdar / PloitKit
The Hacker's ToolBox
☆179Updated 7 years ago
Related projects: ⓘ
- ☆152Updated this week
- Advanced Hash Manipulation☆172Updated 4 years ago
- ☆136Updated this week
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆435Updated 7 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆267Updated 3 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆218Updated 3 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆90Updated 5 years ago
- ☆293Updated this week
- Passive Vulnerability Auditor☆128Updated 8 years ago
- ☆114Updated this week
- Python framework for IT security tools☆260Updated 7 years ago
- Exploits and Security Tools Framework 2.0.1☆303Updated 2 years ago
- Poison, reset, spoof, redirect MITM script☆124Updated last year
- Tulpar - Web Vulnerability Scanner☆197Updated 4 years ago
- ☆260Updated this week
- A unified console to perform the "kill chain" stages of attacks.☆198Updated last year
- Mass exploitation tool in python☆201Updated 5 years ago
- ☆123Updated this week
- search for hosts info with shodan☆226Updated 3 years ago
- ☆197Updated this week
- ☆236Updated this week
- Phishing on Twitter☆250Updated 6 years ago
- Tools that are related to pentest and network security☆94Updated 3 years ago
- Automates some pentest jobs via nmap xml file☆318Updated 6 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆159Updated 5 years ago
- ☆93Updated this week
- ☆133Updated this week
- ☆127Updated this week