Linux bash script automation for metasploit
☆268Jul 11, 2019Updated 6 years ago
Alternatives and similar repositories for ezsploit
Users that are interested in ezsploit are comparing it to the libraries listed below
Sorting:
- Git all your favorite tools in one click☆270Mar 10, 2022Updated 3 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆379Apr 13, 2017Updated 8 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆448Jan 31, 2018Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- NXcrypt - 'python backdoor' framework☆368Jun 26, 2017Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Arduino Rubber Ducky Framework☆107Apr 29, 2019Updated 6 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Tools for information gathering☆355May 20, 2024Updated last year
- Hakku Framework penetration testing☆353Oct 17, 2021Updated 4 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆260Nov 14, 2018Updated 7 years ago
- Malware detection using learning and information retrieval for Android☆74Aug 11, 2020Updated 5 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆49Feb 8, 2020Updated 6 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,321Jan 23, 2018Updated 8 years ago
- Advanced Hash Manipulation☆175Oct 14, 2019Updated 6 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆874Dec 28, 2018Updated 7 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- Fud Payload generator script☆251Mar 18, 2019Updated 6 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Sep 19, 2017Updated 8 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆933May 28, 2025Updated 9 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago