Created by Jin Qian via the GitHub Connector
☆437Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for metasploit-vulnerability-emulator
Users that are interested in metasploit-vulnerability-emulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,483Feb 13, 2025Updated last year
- A modern vulnerable web app☆1,023Mar 11, 2021Updated 5 years ago
- Command line utility for searching and downloading exploits☆1,815Sep 10, 2025Updated 6 months ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- Created by Jin Qian via the GitHub Connector☆798Feb 13, 2025Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- ☆142Apr 21, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,828Jan 19, 2020Updated 6 years ago
- My musings with PowerShell☆2,708Nov 19, 2021Updated 4 years ago
- A tool to dump the login password from the current linux user☆4,087Sep 5, 2025Updated 6 months ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,149Mar 31, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆240Dec 6, 2018Updated 7 years ago
- a new crawler based on python with more function including Network fingerprint search☆504Aug 14, 2018Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- This project has stopped to maintenance, please to https://github.com/knownsec/pocsuite3 project.☆1,821May 27, 2022Updated 3 years ago
- Vulnerability Labs for security analysis☆1,170Mar 10, 2021Updated 5 years ago
- AntiVirus Evasion Tool☆1,747Apr 23, 2025Updated 11 months ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Post Exploitation Collection☆1,572May 1, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- It is a hack tool kit for pentest and web security research.☆517Oct 2, 2020Updated 5 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,995Oct 10, 2018Updated 7 years ago
- discontinued☆527Aug 17, 2023Updated 2 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,841Sep 24, 2021Updated 4 years ago
- tool to extract passwords from TeamViewer memory using Frida☆464Jul 17, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 8 years ago
- ☆614Oct 4, 2024Updated last year
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆825Dec 6, 2017Updated 8 years ago
- ✍️ A curated list of CVE PoCs.☆3,483Jan 4, 2022Updated 4 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Jan 28, 2018Updated 8 years ago
- Miscellaneous exploit code☆1,570Oct 6, 2023Updated 2 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,915Sep 7, 2020Updated 5 years ago