A simple bash based metasploit automation tool!
☆125Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for Autopwn
Users that are interested in Autopwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple tool to check whether a particular host is alive or not!☆22Oct 11, 2021Updated 4 years ago
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆141Apr 29, 2020Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Pentesting suite for Maltego based on data in a Metasploit database☆149Jun 24, 2018Updated 7 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- This repo consists of the projects that I completed as a part of the Udacity's Data Analyst Nanodegree's curriculum.☆13Apr 11, 2018Updated 8 years ago
- NXcrypt - 'python backdoor' framework☆368Jun 26, 2017Updated 8 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆214Mar 27, 2022Updated 4 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- Social Engineering Tool☆189Jul 24, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- for mass exploiting☆613Jul 14, 2022Updated 3 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Autosploit = Automating Metasploit Modules.☆77Jul 14, 2019Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆66Feb 10, 2018Updated 8 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Apr 7, 2023Updated 3 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 8 months ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- metasploitHelper☆253Apr 3, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- network reconnaissance toolkit☆436Dec 17, 2018Updated 7 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- Proxy scraper for proxychains☆43Oct 10, 2020Updated 5 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆444Jul 11, 2017Updated 8 years ago
- Research on the various credentials databases that have been dumped.☆11Jan 31, 2018Updated 8 years ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆407Nov 14, 2022Updated 3 years ago