Skip to content
#

metasploit

Here are 258 public repositories matching this topic...

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

  • Updated Mar 9, 2020
  • Shell

[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.

  • Updated Dec 23, 2019

Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram

  • Updated Jun 27, 2021
  • Python

Improve this page

Add a description, image, and links to the metasploit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the metasploit topic, visit your repo's landing page and select "manage topics."

Learn more