starksimilarity / msf_promptLinks
Python emulator of msfconsole
☆12Updated 5 years ago
Alternatives and similar repositories for msf_prompt
Users that are interested in msf_prompt are comparing it to the libraries listed below
Sorting:
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- The best way to send emails in Go.☆11Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Subdomain Enumeration and Scanner☆34Updated 5 years ago
- recover Firefox and more browsers logins☆48Updated 3 years ago
- Configurable, Community driven, HTTP C2 Profile☆27Updated 5 months ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 4 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Updated 4 months ago
- Scripts for OSCE☆18Updated 6 years ago
- ☆25Updated 3 years ago
- Network Finger Printer☆16Updated 7 years ago
- Ansible scripts to build an attack box☆25Updated 7 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Python driver for Wappalyzer, a web application detection utility.☆11Updated 5 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Sp00fer blog post -☆25Updated 3 years ago