trustedsec / metasploit-framework
Metasploit Framework
☆28Updated 11 years ago
Alternatives and similar repositories for metasploit-framework:
Users that are interested in metasploit-framework are comparing it to the libraries listed below
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- ☆81Updated last year
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 9 years ago
- This repo contains Powershell scripts used for general hackery.☆8Updated 10 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 11 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆37Updated 2 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆30Updated 7 years ago
- Pentest dropbox setup scripts for Kali Linux☆89Updated 9 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Captive portal cloner and payload distributor for the WiFi Pineapple NANO and TETRA☆27Updated 4 years ago
- A Script to Convert Debian Linux into Kali Linux☆53Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- Script to check Kali Linux configs☆25Updated 6 years ago
- hackpack to go with lazykali on menu application Kali Linux☆29Updated 10 years ago
- giskismet – Wireless recon visualization tool☆53Updated 8 years ago
- Tools and scripts dedicated to Android application security☆49Updated 4 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 6 years ago
- Bash script to fully setup your kali system.☆49Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆20Updated 8 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago