Parser for the JSON database included in metasploit-framework that emits a CSV file of modules keyed by vulnerability IDs and references. NOTE: Superseded by git_vul_driller linked below.
-
Updated
May 15, 2024 - Python
Parser for the JSON database included in metasploit-framework that emits a CSV file of modules keyed by vulnerability IDs and references. NOTE: Superseded by git_vul_driller linked below.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Metasploit Framework plugin for the Dradis Framework
Welcome to the exhilarating world of DrShell! 🎉 DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security professional, a network administrator, or a cybersecurity enthusiast
DATA HACKER KONTOL ZAAXPLOIT REAL
Install Metasploit Framework 6 in Termux
Web Penetration Testing : File Upload Vulnerability Dengan Metasploit.
TryHackMe Roadmap
Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit simplifies repetitive metasploit functions such as generating payloads, deploying listeners, and injecting msf payloads into Windows exectuables.
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Instainfo is a OSINT tool on Instagram Made in Python. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname it provides alot of functionalities
fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)
Root your replit.
The "Argus Extraction System" is a mobile forensics project developed during the CyberX Hackathon. It is designed to extract valuable information from mobile devices, providing crucial assistance in investigations and enhancing overall security measures.
Install Metasploit In Termux 2023, No Error, Maintained, Termux
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.
C2 Server for pentesting, exploitation, and payload creation
C2 extensible for post-explotation and remote control
Add a description, image, and links to the metasploit-framework topic page so that developers can more easily learn about it.
To associate your repository with the metasploit-framework topic, visit your repo's landing page and select "manage topics."