rapid7 / metakitty
Metakitty, The Metasploit Resource Portal
☆17Updated 2 months ago
Alternatives and similar repositories for metakitty:
Users that are interested in metakitty are comparing it to the libraries listed below
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 9 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Default Payloads to Attach to Emails When Using Gophish☆9Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆13Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Post-Exploitation Framework☆75Updated 7 years ago
- Side Channel script☆25Updated last year
- Create lists from nmap output.☆13Updated 3 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- MS17-010☆12Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 4 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 9 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated last month
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago