A simple bash based metasploit automation tool!
☆125Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for Autopwn
Users that are interested in Autopwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple tool to check whether a particular host is alive or not!☆22Oct 11, 2021Updated 4 years ago
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆142Apr 29, 2020Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Jul 2, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆91May 8, 2018Updated 8 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98May 12, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Pentesting suite for Maltego based on data in a Metasploit database☆149Jun 24, 2018Updated 7 years ago
- Powershell script to setup windows port forwarding using native netsh client☆125Aug 6, 2018Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- This repo consists of the projects that I completed as a part of the Udacity's Data Analyst Nanodegree's curriculum.☆13Apr 11, 2018Updated 8 years ago
- NXcrypt - 'python backdoor' framework☆368Jun 26, 2017Updated 8 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆213Mar 27, 2022Updated 4 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Social Engineering Tool☆189Jul 24, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- for mass exploiting☆614Jul 14, 2022Updated 3 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆133May 27, 2019Updated 6 years ago
- Autosploit = Automating Metasploit Modules.☆77Jul 14, 2019Updated 6 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆877Dec 28, 2018Updated 7 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆66Feb 10, 2018Updated 8 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Apr 7, 2023Updated 3 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 9 months ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- metasploitHelper☆253Apr 3, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- network reconnaissance toolkit☆438Dec 17, 2018Updated 7 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- Proxy scraper for proxychains☆43Oct 10, 2020Updated 5 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Research on the various credentials databases that have been dumped.☆11Jan 31, 2018Updated 8 years ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆407Nov 14, 2022Updated 3 years ago