vulnersCom / getsploitLinks
Command line utility for searching and downloading exploits
☆1,771Updated 11 months ago
Alternatives and similar repositories for getsploit
Users that are interested in getsploit are comparing it to the libraries listed below
Sorting:
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,256Updated 10 months ago
- Pop shells like a master.☆1,463Updated 6 years ago
- online port scan scraper☆1,119Updated last year
- A framework for wireless pentesting.☆1,209Updated 4 years ago
- wide range mass audit toolkit☆1,025Updated 6 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆2,025Updated last year
- Find exploits in local and online databases instantly☆1,738Updated 3 years ago
- This tool can be used to brute discover GET and POST parameters☆1,373Updated 5 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,611Updated last year
- A default credential scanner.☆1,482Updated 3 years ago
- Striker is an offensive information and vulnerability scanner.☆2,285Updated 2 years ago
- Miscellaneous exploit code☆1,553Updated last year
- SSH man-in-the-middle tool☆1,660Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,157Updated 2 years ago
- Vulnerability Labs for security analysis☆1,172Updated 4 years ago
- Network Infrastructure Penetration Testing Tool☆1,650Updated 4 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,213Updated 6 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,846Updated 11 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,660Updated 6 months ago
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,691Updated 9 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 4 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,190Updated 6 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated last year
- ☆2,262Updated last year
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 7 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,310Updated 3 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,732Updated 2 weeks ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆613Updated 6 years ago
- Git All the Payloads! A collection of web attack payloads.☆3,784Updated 2 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,253Updated 3 weeks ago