hacking-material-books
My collection of articles/books about programing
There are no reviews yet. Be the first to send feedback to the community and the maintainers!
venom
venom - C2 shellcode generator/compiler/handlerFakeImageExploiter
Use a Fake image.jpg to exploit targets (hide known file extensions)morpheus
Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)meterpeter
C2 Powershell Command & Control Framework with BuiltIn Commandsbackdoorppt
transform your payload.exe into one fake word doc (.ppt)trojanizer
Trojanize your payload - WinRAR (SFX) automatization - under Linux distrosMeterpreter_Paranoid_Mode-SSL
Meterpreter Paranoid Mode - SSL/TLS connectionsredpill
Assist reverse tcp shells in post-exploration tasksmsf-auxiliarys
My collection of metasploit auxiliary post-modulesresource_files
mosquito - Automating reconnaissance and brute force attacksnetool-toolkit
MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --nmap-nse-modules
My collection of nmap nse modulesRC-exploiter
NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)PandoraBox
Transform your batch (bat) script into one binary.exeSamsung-TV-Denial-of-Service-DoS-Attack
Samsung TV Denial of Service (DoS) Attackspoof_mac
change mac address without using macchanger (NetworkManager9 clone bug)postgresql-fix
Metasploit_postgresql_database_connection_fixLove Open Source and this site? Check out how you can help us