rpranshu / AutopwnView external linksLinks
A simple bash based metasploit automation tool!
☆125Feb 16, 2023Updated 2 years ago
Alternatives and similar repositories for Autopwn
Users that are interested in Autopwn are comparing it to the libraries listed below
Sorting:
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆140Apr 29, 2020Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Jun 24, 2018Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- for mass exploiting☆613Jul 14, 2022Updated 3 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Social Engineering Tool☆189Jul 24, 2018Updated 7 years ago
- Autosploit = Automating Metasploit Modules.☆77Jul 14, 2019Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- NXcrypt - 'python backdoor' framework☆368Jun 26, 2017Updated 8 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- Proxy scraper for proxychains☆43Oct 10, 2020Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆102Apr 7, 2023Updated 2 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆874Dec 28, 2018Updated 7 years ago
- ☆14Aug 27, 2025Updated 5 months ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Apr 1, 2020Updated 5 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- network reconnaissance toolkit☆433Dec 17, 2018Updated 7 years ago
- A Metasploit auto auxiliary script☆103Oct 11, 2022Updated 3 years ago
- BadProxy is the tool which show a man in middle attack over the internet over the proxy☆10Mar 31, 2018Updated 7 years ago
- Android remote administration client☆11May 4, 2018Updated 7 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- metasploitHelper☆252Apr 3, 2020Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Jul 11, 2017Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆292Feb 28, 2018Updated 7 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- pentest framework☆1,243Feb 21, 2019Updated 6 years ago