Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python metasploit
metasploit
x
python
x
132 search results found
Autosploit
⭐
4,858
Automated Mass Exploiter
Unicorn
⭐
3,583
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
Recon Ng
⭐
1,849
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
Winpayloads
⭐
1,525
Undetectable Windows Payload Generation
Easy_hack
⭐
1,466
Hack the World using Termux
Kithack
⭐
1,343
Hacking tools pack & backdoors generator.
V3n0m Scanner
⭐
1,342
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Dronesploit
⭐
1,306
Drone pentesting framework console
Ethical Hacking Tools
⭐
1,159
Complete Listing and Usage of Tools used for Ethical Hacking
007 Thebond
⭐
931
This Script will help you to gather information about your victim or friend.
Hacktheworld
⭐
911
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
Shellshocker Pocs
⭐
775
Collection of Proof of Concepts and Potential Targets for #ShellShocker
Sillyrat
⭐
559
A Cross Platform multifunctional (Windows/Linux/Mac) RAT.
Thorse
⭐
510
THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Ranger
⭐
399
A tool for security professionals to access and interact with remote Microsoft Windows based systems.
Devil
⭐
375
Devil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
Ms17 010 Python
⭐
352
MS17-010: Python and Meterpreter
Msfmania
⭐
321
Python AV Evasion Tools
Roputils
⭐
295
A Return-oriented Programming toolkit
Nebula
⭐
291
AI-Powered Ethical Hacking Assistant
Nxcrypt
⭐
281
NXcrypt - 'python backdoor' framework
Pymetasploit
⭐
258
A full-fledged msfrpc library for Metasploit framework.
Hackers Tool Kit
⭐
241
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Shellver
⭐
229
Reverse Shell Cheat Sheet TooL
Sara
⭐
224
SARA - Simple Android Ransomware Attack
Python Sploitkit
⭐
223
Devkit for building Metasploit-like consoles
Hackingtoolkit
⭐
220
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
Explodingcan
⭐
219
An implementation of NSA's ExplodingCan exploit in Python
Pwnlnx
⭐
215
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Snmp Brute
⭐
214
Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.
Debinject
⭐
214
Inject malicious code into *.debs
Scrounger
⭐
201
Mobile application testing toolkit
Pastejacker
⭐
200
Hacking systems with the automation of PasteJacking attacks.
Metasploithelper
⭐
197
metasploitHelper
Pwnlnx
⭐
196
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Ghost Phisher
⭐
196
Automatically exported from code.google.com/p/ghost-phisher
Lnkup
⭐
192
Generates malicious LNK file payloads for data exfiltration
Killchain
⭐
192
A unified console to perform the "kill chain" stages of attacks.
Rapidpayload
⭐
176
Framework RapidPayload - Metasploit Payload Generator | Crypter FUD AntiVirus Evasion
Paybag
⭐
168
Simple and easy Metasploit payload generator for Linux & Termux
Fido
⭐
162
Teaching old shellcode new tricks
Ispy
⭐
150
ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )
Cve 2016 6366
⭐
150
Public repository for improvements to the EXTRABACON exploit
Terminator
⭐
147
Terminator metasploit payload generator
Acunetix_0day
⭐
141
Acunetix 0day RCE
Rew Sploit
⭐
132
Emulate and Dissect MSF and *other* attacks
Paygen
⭐
120
FUD metasploit Persistence RAT
Andspoilt
⭐
118
Run interactive android exploits in linux.
Msploitego
⭐
115
Pentesting suite for Maltego based on data in a Metasploit database
Wep
⭐
112
A generator to weaponize Macro payloads that can evade EMET and utilises native VB migration.
Darkspiritz
⭐
111
🌔 Official Repository for DarkSpiritz Penetration Framework | Written in Python 🐍
C2 Jarm
⭐
109
A list of JARM hashes for different ssl implementations used by some C2/red team tools.
Penta
⭐
102
Open source all-in-one CLI tool to semi-automate pentesting.
Msfenum
⭐
98
A Metasploit auto auxiliary script
Exploitivator
⭐
84
Automate Metasploit scanning and exploitation
Esteemaudit Metasploit
⭐
83
Porting for Metasploit of the infamous Esteemaudit RDP Exploit
Msfrpc
⭐
83
Perl/Python modules for interfacing with Metasploit MSGRPC
Androidembedit
⭐
80
A quick and dirty python script to embed a Metasploit generated APK file into another APK for fun.
Cyber Sploit
⭐
76
A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules will be added time to time.
Boomer
⭐
71
Framework for exploiting local vulnerabilities
Ms17 010 M4ss Sc4nn3r
⭐
68
MS17-010 multithreading scanner written in python.
Tools
⭐
66
Install Nmap/Hydra/SQLMap/Metasploit & others on your device 🚀
Exserial
⭐
65
Java Untrusted Deserialization Exploits Tools
Metateta
⭐
64
Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit
Apkbleach
⭐
53
Android Payload obfuscation and icon injection tool
Exploit Development
⭐
51
CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
Msf Remote Console
⭐
49
A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules permanently as daemon on your server like autopwn2.
Tmvenom
⭐
46
Generate metasploit Payloads in Easiest way using TM venom specially for Termux users.
Babel Sf
⭐
44
Babel Scripting Framework
Payday
⭐
44
Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes resource handler files.
Eternal Pulsar
⭐
42
Eternalblue-Doublepulsar without Metasploit or python
Scanman
⭐
42
ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).
Auto_settingcontent Ms
⭐
42
This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remote code execution. This automates generating an HTA downloader and embeds it in the SettingContent-ms file for you and starts Apache.
Eternalblue
⭐
40
ElevenPaths EternalBlue Metasploit module - works better than Rapid 7
Dragonms
⭐
39
DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping
Undetected Meterpreter Stagers
⭐
36
Custom stagers with python encrypting proxy
Basecamp
⭐
36
Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp
Pattern
⭐
35
Python implementation of Metasploit's pattern_create/pattern_offset.
Recon Ng
⭐
34
Recon-ng is a full-featured Web Reconnaissance framework written in Python.
Z0172ck Tools
⭐
32
Hacking Tools Z0172CK
Penetration Testing With Shellcode
⭐
31
Penetration Testing with Shellcode, published by Packt
Webdav Exploit
⭐
27
Cve 2020 6287 Exploit
⭐
27
PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https://github.com/rapid7/metasploit-framework/pul This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of thi
Metasploit Baseline Builder
⭐
26
Created by Jeffrey Martin via the GitHub Connector
Gpt
⭐
26
Gadget Pentesting Tool Scripts
Cve 2019 15107
⭐
26
Uzi
⭐
25
A Distinctive Ransomeware.
Msf Undetector
⭐
25
Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.
Mailsploit
⭐
24
Sends some one a malicious payload through smtp and starts a listener with metasploit.
Iosbd
⭐
24
Install a Persistent Backdoor on Jailbroken iOS Devices
Katoolin4termux
⭐
22
Termux support for katoolin
Pyobfuscate
⭐
21
A simple and efficent script to obfuscate python payloads to make it completely FUD
Bot_army
⭐
20
Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.
Kali Linux Dockerfile
⭐
20
A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.
Practical Web Penetration Testing
⭐
20
Practical Web Penetration Testing, published by Packt
Pycrypt
⭐
20
PYcrypt - 'python backdoor' framework
Hash_parser
⭐
17
This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want to see if any of the credentials work on another domain or other systems.
Cve 2022 21907
⭐
17
CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.
Easypeasey
⭐
15
Metasploit/MSFVenom Payload Generator Stand Alone
Pattern
⭐
15
Python implementation of pattern_create and pattern_offset from Metasploit Framework
Related Searches
Python Flask (17,643)
Python Script (17,004)
Python Docker (14,113)
Python Machine Learning (14,099)
Python Command Line (13,351)
Python Network (11,495)
Python Artificial Intelligence (8,580)
Python Server (7,793)
Python Shell (5,055)
Python Git (4,731)
1-100 of 132 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.