rapid7 / metasploit-vulnerability-emulator
Created by Jin Qian via the GitHub Connector
☆434Updated last year
Alternatives and similar repositories for metasploit-vulnerability-emulator:
Users that are interested in metasploit-vulnerability-emulator are comparing it to the libraries listed below
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆325Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- A full-fledged msfrpc library for Metasploit framework.☆303Updated 3 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Updated 4 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- Python framework for IT security tools☆266Updated 8 years ago
- Metasploit AV Evasion Tool☆260Updated 9 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- a package of Pentest scripts I have made or commonly use☆612Updated 6 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆523Updated 8 years ago
- Github for the scripts utilised during Penetration test☆234Updated 7 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆491Updated 3 years ago
- First IDE for Nmap Script (NSE) Development.☆356Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆452Updated 4 years ago
- application server attack toolkit☆684Updated 5 years ago
- [unmaintained] Post-exploitation tool☆185Updated 9 years ago
- PwnWiki - The notes section of the pentesters mind.☆562Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆285Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Updated 7 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆576Updated 7 years ago
- Powershell C2 Server and Implants☆573Updated 5 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- PowerShell Empire Web Interface☆330Updated last year
- Advanced Web Shell☆575Updated 8 years ago
- A python reverse shell that uses DNS as the c2 channel☆506Updated 9 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆303Updated 9 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Updated 7 years ago