Created by Jin Qian via the GitHub Connector
☆437Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for metasploit-vulnerability-emulator
Users that are interested in metasploit-vulnerability-emulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,538Feb 13, 2025Updated last year
- A modern vulnerable web app☆1,028Mar 11, 2021Updated 5 years ago
- Command line utility for searching and downloading exploits☆1,808Sep 10, 2025Updated 7 months ago
- Various PoCs☆501Jan 27, 2020Updated 6 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,045Nov 24, 2019Updated 6 years ago
- Created by Jin Qian via the GitHub Connector☆795Feb 13, 2025Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- ☆143Apr 21, 2017Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,831Jan 19, 2020Updated 6 years ago
- My musings with PowerShell☆2,715Nov 19, 2021Updated 4 years ago
- A tool to dump the login password from the current linux user☆4,104Sep 5, 2025Updated 8 months ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,149Mar 31, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆245Dec 6, 2018Updated 7 years ago
- a new crawler based on python with more function including Network fingerprint search☆504Aug 14, 2018Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Oct 2, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- This project has stopped to maintenance, please to https://github.com/knownsec/pocsuite3 project.☆1,821May 27, 2022Updated 3 years ago
- Vulnerability Labs for security analysis☆1,170Mar 10, 2021Updated 5 years ago
- AntiVirus Evasion Tool☆1,751Apr 23, 2025Updated last year
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Post Exploitation Collection☆1,574May 1, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- It is a hack tool kit for pentest and web security research.☆517Oct 2, 2020Updated 5 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Nov 19, 2017Updated 8 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆2,006Oct 10, 2018Updated 7 years ago
- discontinued☆525Aug 17, 2023Updated 2 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,838Sep 24, 2021Updated 4 years ago
- tool to extract passwords from TeamViewer memory using Frida☆464Jul 17, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploit primitives for PowerShell☆435Mar 25, 2018Updated 8 years ago
- ☆615Oct 4, 2024Updated last year
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆825Dec 6, 2017Updated 8 years ago
- ✍️ A curated list of CVE PoCs.☆3,500Jan 4, 2022Updated 4 years ago
- Add headers to all Burp requests to bypass some WAF products☆328Jan 28, 2018Updated 8 years ago
- Miscellaneous exploit code☆1,567Oct 6, 2023Updated 2 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,925Sep 7, 2020Updated 5 years ago