152 Open Source Metasploit Software Projects
Free and open source metasploit code projects including engines, APIs, generators, and tools.
Discover 2583 ⭐
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Backdoor Apk 1786 ⭐
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
One Lin3r 1374 ⭐
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Vegile 526 ⭐
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Entynetproject Mouse 185 ⭐
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Hrshell 221 ⭐
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
A Red Teamer Diaries 443 ⭐
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Mad Metasploit 269 ⭐
Metasploit custom modules, plugins, resource script and.. awesome metasploit collection
Xeexe Topantivirusevasion 640 ⭐
Web3 Pancakeswap Sniper & honeypot detector Take Profit/StopLose bot written in python3, For WINDOWS & ANDROID & MAC & LINUX
Hackers Tool Kit 325 ⭐
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Entynetproject Entropy 125 ⭐
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Technowhorse 243 ⭐
TechNowHorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Metateta 76 ⭐
Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit
Msf Remote Console 55 ⭐
A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules permanently as daemon on your server like autopwn2.
Jbossexploit 24 ⭐
MSF moudle jboss invoke deploy getshell Exploit & Jboss jmx-console getshell exploit
Firebolt 14 ⭐
A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.
Entynetproject Utopia 19 ⭐
Utopia Framework is a Linux post-exploitation framework that exploits Linux SSH vulnerability to provide a shell-like connection. Utopia Framework can be used to easily master Linux SSH exploitation.
Cnc Detection 14 ⭐
Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation
Cve 2019 5624 14 ⭐
A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)
Yarasploit 31 ⭐
YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Vulnscan Parser 15 ⭐
Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...
Intro To Ethical Hacking 16 ⭐
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action.
Cooolis Ms 692 ⭐
Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具，它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码，帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。
Pedrib Poc 489 ⭐
Advisories, proof of concept files and exploits that have been made public by @pedrib.