rapid7 / metasploit-frameworkLinks
Metasploit Framework
☆36,929Updated last week
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,312Updated 9 months ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,831Updated 3 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆11,933Updated 3 weeks ago
- hydra☆11,213Updated last week
- Nikto web server scanner☆9,853Updated this week
- The Browser Exploitation Framework Project☆10,556Updated last week
- Exploitation Framework for Embedded Devices☆12,842Updated 5 months ago
- Open-Source Phishing Toolkit☆13,318Updated last year
- ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,997Updated 2 weeks ago
- A little tool to play with Windows security☆21,008Updated 6 months ago
- Unified repository for different Metasploit Framework payloads☆1,914Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆15,130Updated last week
- Automatic SQL injection and database takeover tool☆35,915Updated 2 weeks ago
- Next generation web scanner☆6,190Updated last month
- Empire is a PowerShell and Python post-exploitation agent.☆7,735Updated 5 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆9,050Updated last month
- WiFi security auditing tools suite☆6,604Updated 3 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,414Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,858Updated 3 years ago
- An advanced memory forensics framework☆7,888Updated 6 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,711Updated 5 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,453Updated last month
- Ettercap Project☆2,622Updated 4 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,410Updated last month
- A swiss army knife for pentesting networks☆8,978Updated last year
- CTF framework and exploit development library☆13,050Updated 2 weeks ago
- Web path scanner☆13,679Updated last month
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆9,295Updated 3 weeks ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,520Updated last week
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,881Updated last year