Modules, Scripts, Plugins for the Metasploit Framework
☆20May 29, 2011Updated 14 years ago
Alternatives and similar repositories for MSF-Addons
Users that are interested in MSF-Addons are comparing it to the libraries listed below
Sorting:
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 6 years ago
- Configuration files of my old Arch Linux+Xmonad based setup☆16Apr 7, 2017Updated 8 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 9 years ago
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 9 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- RESTful interface to your operating system shell☆19Nov 8, 2017Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Metasploit modules that didn't make it into trunk for some reason or the other☆118Jun 17, 2017Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆248Aug 12, 2014Updated 11 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Jun 12, 2016Updated 9 years ago
- Discover GPS location and private data exposure inside of images using this Burp & ZAP plugin.☆17Jun 18, 2025Updated 8 months ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- An introduction to security for developers.☆28Feb 14, 2021Updated 5 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- A multi service threaded MD5 cracker☆66Jul 15, 2016Updated 9 years ago
- Fork of Dnmap (http://dnmap.sourceforge.net/)☆22Jul 14, 2022Updated 3 years ago