starksimilarity / msf_prompt
Python emulator of msfconsole
☆12Updated 5 years ago
Alternatives and similar repositories for msf_prompt:
Users that are interested in msf_prompt are comparing it to the libraries listed below
- The best way to send emails in Go.☆10Updated 4 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆19Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 3 weeks ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆20Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- ☆26Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 5 years ago
- CVE-2020-0688 PoC☆10Updated 4 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆22Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- Hacky linux memory probe. Yara or Regex scan process memory☆11Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated 2 weeks ago
- ☆13Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- Windows privilege escalation Mafia is a framework provides all resources needed for privilege escalation beginners☆12Updated 3 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago