Created by Jin Qian via the GitHub Connector
☆437Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for metasploit-vulnerability-emulator
Users that are interested in metasploit-vulnerability-emulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,516Feb 13, 2025Updated last year
- A modern vulnerable web app☆1,023Mar 11, 2021Updated 5 years ago
- Command line utility for searching and downloading exploits☆1,812Sep 10, 2025Updated 7 months ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- Created by Jin Qian via the GitHub Connector☆795Feb 13, 2025Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- ☆143Apr 21, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,836Jan 19, 2020Updated 6 years ago
- My musings with PowerShell☆2,711Nov 19, 2021Updated 4 years ago
- A tool to dump the login password from the current linux user☆4,088Sep 5, 2025Updated 7 months ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,149Mar 31, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆243Dec 6, 2018Updated 7 years ago
- a new crawler based on python with more function including Network fingerprint search☆505Aug 14, 2018Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- This project has stopped to maintenance, please to https://github.com/knownsec/pocsuite3 project.☆1,821May 27, 2022Updated 3 years ago
- Vulnerability Labs for security analysis☆1,171Mar 10, 2021Updated 5 years ago
- AntiVirus Evasion Tool☆1,750Apr 23, 2025Updated 11 months ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Post Exploitation Collection☆1,572May 1, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- It is a hack tool kit for pentest and web security research.☆517Oct 2, 2020Updated 5 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆2,001Oct 10, 2018Updated 7 years ago
- discontinued☆528Aug 17, 2023Updated 2 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,839Sep 24, 2021Updated 4 years ago
- tool to extract passwords from TeamViewer memory using Frida☆464Jul 17, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Exploit primitives for PowerShell☆436Mar 25, 2018Updated 8 years ago
- ☆614Oct 4, 2024Updated last year
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆826Dec 6, 2017Updated 8 years ago
- ✍️ A curated list of CVE PoCs.☆3,490Jan 4, 2022Updated 4 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Jan 28, 2018Updated 8 years ago
- Miscellaneous exploit code☆1,568Oct 6, 2023Updated 2 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,920Sep 7, 2020Updated 5 years ago