Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for kali metasploit
kali
x
metasploit
x
40 search results found
Learn Hacking
⭐
1,576
开始学习Kali Linux 各种破解教程 渗透测试 逆向工程 HackThisSite挑战问题解答
Winpayloads
⭐
1,525
Undetectable Windows Payload Generation
Pimpmykali
⭐
1,483
Kali Linux Fixes for Newly Imported VM's
Adb Toolkit
⭐
1,185
ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
Redcloud
⭐
1,177
Automated Red Team Infrastructure deployement using Docker
Msfpc
⭐
1,166
MSFvenom Payload Creator (MSFPC)
Ethical Hacking Tools
⭐
1,159
Complete Listing and Usage of Tools used for Ethical Hacking
Thorse
⭐
510
THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Devil
⭐
375
Devil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
Msfmania
⭐
321
Python AV Evasion Tools
Awesome Cyber Security
⭐
255
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Kali Linux Learning
⭐
179
🐺Kali Linux学习资料(Books&WebSites)
Paybag
⭐
168
Simple and easy Metasploit payload generator for Linux & Termux
Penetration Testing Toolkit
⭐
141
A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more
Pakuri
⭐
140
PAKURI has been merged with Python and launched as a new project, PAKURI-THON.
Ccdc Scripts
⭐
68
Scripts and resources for Red Teaming at CCDC competitions
Hmaverickadams Beginner Network Pentesting
⭐
65
Apkbleach
⭐
53
Android Payload obfuscation and icon injection tool
Kali Linux Ebooks
⭐
46
Top 20 Kali Linux Related E-books (Free Download)
Packer Kali_linux
⭐
39
This is a repository that will be used to help create a process of a new kali vagrant box for hashicorp each week.
Simplifier
⭐
36
Penetration Testing With Shellcode
⭐
31
Penetration Testing with Shellcode, published by Packt
Docker Kali
⭐
27
A Docker image for bits of Kali Linux
Metasploit Android
⭐
22
A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.
Katoolin4termux
⭐
22
Termux support for katoolin
Practical Web Penetration Testing
⭐
20
Practical Web Penetration Testing, published by Packt
Termux Megapackage
⭐
18
This Project will let you install termux black . metasploit , various tools and Kali Nethunter Rootless without any error in your Termux.
Firebolt
⭐
13
A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.
Vjs
⭐
11
The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repairing most of the problems of the Kali Linux system.
Pentest Chef Repo
⭐
11
Chef repository for pentesting tools
Pentester
⭐
10
Pentester Chef cookbook - Install & configures some cool stuff for pentesting
Kali Megapackage
⭐
8
Thp1 2_updates
⭐
8
Ethical Hacking
⭐
7
Pentest
⭐
7
Penetration Testing Dojo Challenge
Penetration Testing
⭐
7
Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and safe test environment
Docker Kali Msf Micro
⭐
6
Docker image with Kali + metasploit/msfconsole + postgresql -without any metasploit modules
Kitt
⭐
6
Python-Based Pentesting Framework
Kaosk Backdoors
⭐
5
Automate the creation of Backdoors and postexplotation activities
Intro To Ethical Hacking
⭐
5
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action.
Related Searches
Shell Kali (487)
Python Kali (408)
Python Metasploit (250)
1-40 of 40 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.