hacking metasploitable v2
☆33Mar 16, 2018Updated 8 years ago
Alternatives and similar repositories for Metasploitable2
Users that are interested in Metasploitable2 are comparing it to the libraries listed below
Sorting:
- Recon Automation☆11Sep 14, 2024Updated last year
- A Conky For parrot Os☆10Dec 3, 2018Updated 7 years ago
- vulnerability that allows unauthorized control of an IP camera using the ONVIF protocol, The provided proof-of-concept code is capable c…☆12Apr 13, 2025Updated 11 months ago
- Tiny plugin for bash shell to autocomplete commands and model names in ollama commands☆23Apr 27, 2025Updated 10 months ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- Piso wifi vendo trolling tool☆13Dec 14, 2023Updated 2 years ago
- Eternalblue-Doublepulsar-Metasploit☆21May 11, 2017Updated 8 years ago
- A complete, hands-on guide to mastering Parrot OS for cybersecurity and ethical hacking. Includes Linux fundamentals, permissions, script…☆21Jun 10, 2025Updated 9 months ago
- Osmocom SS7 stack, with Shadytel modifications.☆19Aug 2, 2012Updated 13 years ago
- A collection of crypters, binders, mailers etc for M$ Windows☆24Apr 27, 2018Updated 7 years ago
- Custom Kali Linux☆22Feb 8, 2014Updated 12 years ago
- create fully undetectable payload☆17Mar 29, 2023Updated 2 years ago
- DEDSEC-VPN is a Linux-based VPN tool that hides your real IP and blocks IPv6 leaks.☆31Feb 21, 2026Updated 3 weeks ago
- ☆13May 20, 2023Updated 2 years ago
- A collection of Kode Dot Projects ready to use☆23Nov 19, 2025Updated 4 months ago
- A lightly modified kernel for the Nexus 6P. Based on stock Android msm sources and leanKernel☆10Mar 20, 2018Updated 8 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆24Jan 29, 2024Updated 2 years ago
- Fork of the Blaze library for compatibility with Blaze CUDA · https://bitbucket.org/blaze-lib/blaze · https://github.com/STEllAR-GROUP/bl…☆10Oct 17, 2019Updated 6 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆10Aug 30, 2020Updated 5 years ago
- ☆17Aug 3, 2017Updated 8 years ago
- FSharp redis codecs based on Fleece patterns☆13Apr 2, 2022Updated 3 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- 吉日嘎啦-通用权限管理系统 V3.7☆10Feb 5, 2017Updated 9 years ago
- A super fast multithreaded ports scanner that scans for open listening ports on the target server with multiple methods and user-specifie…☆23May 28, 2021Updated 4 years ago
- Sourcegraph workflow for Alfred☆15Jun 24, 2016Updated 9 years ago
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Nov 27, 2025Updated 3 months ago
- A fast dictionary attack tool (700,000+ candidates per second), that attacks a supported hash with a user-defined dictionary file's candi…☆22May 3, 2021Updated 4 years ago
- This project is a modification of Openra1n to fully boot jailbreak on iOS 15 - 16.5.1 . with the help of Palera1n's code, this project no…☆12Jul 27, 2023Updated 2 years ago
- WiPhone daughterboard schematic and PCB layout footprint for Eagle.☆10May 8, 2020Updated 5 years ago
- Python scripts and tools built during my learning journey☆31Nov 14, 2025Updated 4 months ago
- A simple application to turn on the flashlight when the phone is shaken☆13May 21, 2021Updated 4 years ago
- ☆26Dec 15, 2023Updated 2 years ago
- Moobot Botnet | Leaked version☆18Jan 11, 2021Updated 5 years ago
- ☆10May 25, 2023Updated 2 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- A tool for sniffing ticwatch firmwares.☆10Jul 29, 2017Updated 8 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago