Showing 29 open source projects for "metasploit on windows"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    Armitage for Windows
    Armitage is a GUI frontend for Metasploit. Well known to Kali Linux fans, these are ports of it for Windows and Mac. Tip: Enter these in the Armitage console: db_status if not connected enter: db_connect msf 127.0.0.1 4-19-26: Made a small tweak to the msfrpcd batch file that should help performance. 4-23-26: Upload speeds tend to be faster on the Linux version. 4-25-26: Better upload speeds with the Windows firewall disabled.
    Downloads: 31 This Week
    Last Update:
    See Project
  • 2
    discover

    discover

    Automation framework for reconnaissance and penetration testing tasks

    Discover is a collection of custom Bash scripts designed to automate many common tasks involved in penetration testing workflows. The project brings together a variety of security testing functions into a single framework that simplifies reconnaissance, scanning, and enumeration processes. It provides a menu-driven interface that allows security professionals to quickly launch different tools and scripts without manually executing each command. The framework helps streamline activities such...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Ghost of Death
    ...It has Windows, Mac and Android now. Windows comes closest for the spoof, but none of the profiles will let them know your running Kali.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Kali-Proxy
    Kali-Proxy is a System-wide Proxy Manager for Kali Linux (XFCE) System Tray Icon Lives in the XFCE system tray. Right-click to access all options. Icon colours indicate current proxy state: White No proxy active Red SOCKS proxy active Purple Tor routing active Orange Transparent proxy active SOCKS4 / SOCKS5 Proxy Routes traffic through a SOCKS4 or SOCKS5 proxy of your choice. Configure host, port, and version...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    TheMatrixVM
    ...Perform an NMAP scan like how Trinity did to hack the grid! try all ports :) 6. Good luck and enjoy the CTF! Learning Pre-Requisites - This VM does not require exploiting a CVE, or use of MetaSploit/Commercial exploit tools. - Requires intermediary knowlege of linux as it is based on Alpine.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    Shennina

    Shennina

    Automating Host Exploitation with AI

    Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence. Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. Shennina scans a set of input targets for available network services, uses its AI engine...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    VENOM C2 shellcode

    VENOM C2 shellcode

    C2 shellcode generator/compiler/handler

    The script will use msfvenom (metasploit) to generate shellcode in different formats ( C# | python | ruby | dll | msi | hta-psh | doc | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python function will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a handler to receive the remote connection (shell or meterpreter) venom...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    ADB-Toolkit V2.3

    ADB-Toolkit V2.3

    ADB-Toolkit V2 for easy ADB tricks with many perks in all one

    Tool for testing your Android device and hacking someone's Android Phone (Don't use it with wrong intentions). ADB-Toolkit is a BASH Script with 28 options and a METASPLOIT Section which has 6 options and is made to do easy penetration testing in Android Devices. You can do pretty much anything with this script and test your Android device is it safe or not. This script is made with the help of ADB (Android Debug Bridge) it’s a tool that is used by developers to debug the Android device but...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 9
    WebSploit Framework

    WebSploit Framework

    WebSploit is a high level MITM Framework

    WebSploit Advanced MITM Framework [+]Autopwn - Used From Metasploit For Scan and Exploit Target Service [+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin [+]format infector - inject reverse & bind payload into file format [+]phpmyadmin Scanner [+]CloudFlare resolver [+]LFI Bypasser [+]Apache Users Scanner [+]Dir Bruter [+]admin finder [+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks [+]MITM - Man In The Middle Attack [+]Java Applet Attack [+]MFOD...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 10
    TheFatRat

    TheFatRat

    Thefatrat a massive exploiting tool

    TheFatRat is an exploiting tool that compiles malware with a famous payload, and then the compiled malware can be executed on Linux, Windows, Mac, and Android. TheFatRat provides an easy way to create backdoors and payload which can bypass most anti-virus. This tool is for educational purposes only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not responsible for any misuse or damage caused by this program. This tool...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    MozDef

    MozDef

    MozDef: Mozilla Enterprise Defense Platform

    MozDef aims to bring real-time incident response and investigation to the defensive toolkits of security operations groups in the same way that Metasploit, LAIR, and Armitage have revolutionized the capabilities of attackers. We use MozDef to ingest security events, alert us to security issues, investigate suspicious activities, handle security incidents, and visualize and categorize threat actors. The real-time capabilities allow our security personnel all over the world to work...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    Kage

    Kage

    Kage is Graphical User Interface for Metasploit Meterpreter

    ...For now it only supports windows/meterpreter & android/meterpreter.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Metasploit Framework

    Metasploit Framework

    Metasploit Framework

    Metasploit Framework is a comprehensive penetration-testing and exploit development platform that streamlines the process of discovering, validating, and demonstrating vulnerabilities. It provides a modular architecture—payloads, encoders, exploits, auxiliaries, and post-exploitation modules—so security professionals can piece together complex attack chains or test defensive controls in realistic ways. Built-in features include an exploit database, network scanners, credential harvesters,...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 15
    Katana : Multi-Boot Security Suite
    Katana packages security / ethical hacking distributions (like Backtrack, Ophcrack, & UBCD) together with portable Windows applications (like Metasploit, NMAP, Cain & Able, & Wireshark) to run off a single USB flash drive.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    venom - shellcode generator

    venom - shellcode generator

    msfvenom shellcode generator/compiler/listenner

    The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ), injects the shellcode generated into one funtion (example: python) "the python funtion will execute the shellcode in ram" and uses compilers like: gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recibe the remote connection (reverse shell or meterpreter session). -- 'shellcode generator' tool...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    myAuxiliary.rb

    myAuxiliary.rb

    msf post-exploitation auxiliary module

    This auxiliary module needs [metasploit] framework installed.. This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script, so we need to exploit a target first in order to use it. Affected platforms: Windows OS (all versions above windows vista) Read my WIKI for further info: https://sourceforge.net/p/myauxiliarymete/wiki/Home/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    HS|OS Blackhat OpenBox Edition
    HS|OS BlackHat Edition Openbox Version Nice for small Configuration :) Mode camouflage : login : user | pass : resu Mode HSBE : login : root | pass : toor Info: Pour Bien faire fonctionner metasploit : après l'installation, connectez-vous comme utilisateur root / toor - ouvrir terminator ou appuyez sur (touche windows + t) et tapez : mkdir -p /var/log/postgresql puis tapez : service postgresql start Déconnectez-vous, puis reconnectez-vous. pour apache2 fonctionne : connectez-vous comme utilisateur root / toor - ouvrir terminator ou appuyez sur (touche windows + t) et tapez : mkdir -p /var/log/apache2 et crée un fichier error.log Voila 2 seul chose a faire après tout ira bien ----------------------------------------------------------------------------------- install dualboot ? ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19

    Penetration-Testing-Toolkit v1.0

    A web interface for various penetration testing tools

    Penetration-Testing-Toolkit is a web based project to automate Scanning a network,Exploring CMS, Generating Undectable metasploit payload, DNS-Queries, IP related informations, Information Gathering, Domain related info etc
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Sandi

    Sandi

    Sandi Exploit Search Engine

    Sandi and open source project for search the exploits from exploit databases ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    BHS Debian (Hades Update)

    BHS Debian (Hades Update)

    BHS debian (testing) jessie/sid

    BHS (Debian) New BHS release Based on Debian jessie/sid Kermel 3.12 KDE 4.11 Debian style and look Custom scripts!! Defcon tools!! New wifi scripts Multiarch support Top tools username: root password: BHS note: Don't forget to run the script located on the desktop to install the missing tools,because without to run it the menu will not be functional,if you not see it just download from here in the file section..sorry for the delay the upload stack for 2...
    Downloads: 21 This Week
    Last Update:
    See Project
  • 22

    pMap

    Discovery, Scanning, and Fingerprinting via Broadcast and Multicast Tr

    Passively discover, scan, and fingerprint link-local peers by the background noise they generate (i.e. their broadcast and multicast traffic)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Bash script for pententester to allow them to hack system in 10 minutes with easy interfaces depends on backtrack5r3 scripts like metasploit,nmap ,ettercap ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    0dysseus

    0dysseus

    0dysseus - Footprinting & Vulnerability Assessment Tool

    Copyleft 2013, N. Bell Licenced under the terms of the GPLv3 0dysseus Is an Open Source Information gathering tool. The program incorporates other open source software tools such as nmap, amap, nbtscan and the metasploit framework and brings them all together in one powerfull toolset. - NB Only use this tool if you have permission to scan the network. Use at your own risk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB