Skip to content
#

metasploit

Here are 191 public repositories matching this topic...

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

  • Updated Mar 9, 2020
  • Shell

[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.

  • Updated Dec 23, 2019
mouse

Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.

  • Updated Jun 10, 2020
  • Python

Improve this page

Add a description, image, and links to the metasploit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the metasploit topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.