Metasploit Framework
☆37,673Mar 9, 2026Updated last week
Alternatives and similar repositories for metasploit-framework
Users that are interested in metasploit-framework are comparing it to the libraries listed below
Sorting:
- A little tool to play with Windows security☆21,316May 11, 2025Updated 10 months ago
- Automatic SQL injection and database takeover tool☆36,812Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,337Mar 9, 2026Updated last week
- Empire is a PowerShell and Python post-exploitation agent.☆7,824Jan 19, 2020Updated 6 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,850Nov 10, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,534Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,937Mar 9, 2026Updated last week
- The Browser Exploitation Framework Project☆10,771Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,907Aug 17, 2020Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆12,550Updated this week
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,469Feb 13, 2025Updated last year
- A swiss army knife for pentesting networks☆9,093Dec 6, 2023Updated 2 years ago
- Unified repository for different Metasploit Framework payloads☆1,971Feb 16, 2026Updated last month
- Ghidra is a software reverse engineering (SRE) framework☆65,593Updated this week
- Pre-Built Vulnerable Environments Based on Docker-Compose☆20,385Updated this week
- Web path scanner☆14,065Feb 20, 2026Updated 3 weeks ago
- hydra☆11,707Feb 7, 2026Updated last month
- CTF framework and exploit development library☆13,297Mar 5, 2026Updated last week
- Exploitation Framework for Embedded Devices☆13,022Mar 2, 2026Updated last week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,424Jun 5, 2025Updated 9 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,787Apr 25, 2024Updated last year
- windows-kernel-exploits Windows平台提权漏洞集合☆8,612Jun 11, 2021Updated 4 years ago
- UNIX-like reverse engineering framework and command-line toolset☆23,237Updated this week
- Six Degrees of Domain Admin☆10,551Mar 2, 2026Updated 2 weeks ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,663Oct 21, 2024Updated last year
- Nikto web server scanner☆10,179Mar 4, 2026Updated last week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,411Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,933Mar 6, 2026Updated last week
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,943Mar 22, 2024Updated last year
- World's fastest and most advanced password recovery utility☆25,581Feb 20, 2026Updated 3 weeks ago
- Web application fuzzer☆6,440Jan 21, 2026Updated last month
- Directory/File, DNS and VHost busting tool written in Go☆13,501Updated this week
- A collection of awesome penetration testing resources, tools and other shiny things☆25,519Jan 25, 2026Updated last month
- Most advanced XSS scanner.☆14,805Apr 26, 2025Updated 10 months ago
- E-mails, subdomains and names Harvester - OSINT☆15,772Mar 7, 2026Updated last week
- Fast subdomains enumeration tool for penetration testers☆10,849Aug 2, 2024Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,796Dec 4, 2025Updated 3 months ago
- In-depth attack surface mapping and asset discovery☆14,256Updated this week
- A collection of various awesome lists for hackers, pentesters and security researchers☆108,276Jan 18, 2025Updated last year