Created by Jeffrey Martin via the GitHub Connector
☆50Feb 13, 2025Updated last year
Alternatives and similar repositories for metasploit-aggregator
Users that are interested in metasploit-aggregator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 6 months ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- ☆17May 29, 2015Updated 10 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆20Jun 2, 2016Updated 9 years ago
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- Siemens Simatic S7 Metasploit Modules☆41Jul 14, 2012Updated 13 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Aug 7, 2020Updated 5 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Mar 27, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- ☆94Nov 1, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Jul 22, 2017Updated 8 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- ☆98Mar 16, 2016Updated 10 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 8 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆463Oct 3, 2017Updated 8 years ago
- ☆54Aug 13, 2018Updated 7 years ago