entynetproject / Arissploit
Licence: gpl-3.0
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114
Programming Languages
python
139335 projects - #7 most used programming language
Labels
Projects that are alternatives of or similar to Arissploit
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+579.82%)
Mutual labels: vulnerabilities, vulnerability-scanners, vulnerability-detection, vulnerability-scanner
scan-cli-plugin
Docker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (+18.42%)
Mutual labels: vulnerability, vulnerabilities, vulnerability-detection, vulnerability-scanners
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (+538.6%)
Mutual labels: pentesting, exploitation, exploits, exploitation-framework
browserrecon-php
Advanced Web Browser Fingerprinting
Stars: ✭ 29 (-74.56%)
Mutual labels: vulnerability, exploitation, vulnerability-detection, vulnerability-scanners
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-9.65%)
Mutual labels: pentesting, exploitation, vulnerability-scanners, vulnerability-detection
Sqlmap
Automatic SQL injection and database takeover tool
Stars: ✭ 21,907 (+19116.67%)
Mutual labels: database, pentesting, exploitation, vulnerability-scanner
Vfeed
The Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+624.56%)
Mutual labels: vulnerability, vulnerability-scanners, exploits, vulnerability-detection
Xunfeng
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+2646.49%)
Mutual labels: pentesting, vulnerability-scanners, exploits, vulnerability-detection
Api
Vulners Python API wrapper
Stars: ✭ 313 (+174.56%)
Mutual labels: database, vulnerability, exploits, vulnerability-detection
Securitymanageframwork
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+231.58%)
Mutual labels: pentesting, vulnerability-scanners, exploits, vulnerability-detection
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+7657.89%)
Mutual labels: vulnerabilities, vulnerability-scanners, vulnerability-detection, vulnerability-scanner
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-23.68%)
Mutual labels: pentesting, vulnerability, vulnerabilities
Prismatica
Responsive Command and Control System
Stars: ✭ 81 (-28.95%)
Mutual labels: pentesting, exploitation, exploitation-framework
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-21.93%)
Mutual labels: vulnerabilities, exploits, vulnerability-detection
Herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+438.6%)
Mutual labels: vulnerability, exploitation, exploits
Whour
Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.
Stars: ✭ 18 (-84.21%)
Mutual labels: vulnerability, vulnerability-scanners, vulnerability-detection
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-36.84%)
Mutual labels: vulnerability, vulnerabilities, exploits
Vulscan
vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Stars: ✭ 486 (+326.32%)
Mutual labels: vulnerability, vulnerability-scanners, exploitation-framework
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+686.84%)
Mutual labels: exploitation, vulnerability-detection, vulnerability-scanner
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+9067.54%)
Mutual labels: vulnerability, vulnerability-scanners, exploits
Arissploit Framework
About Arissploit Framework
Arissploit Framework is a simple framework designed to master penetration
testing tools. Arissploit Framework offers simple structure, basic CLI, and
useful features for learning and developing penetration testing tools.
Getting started
Arissploit installation
cd arissploit
chmod +x install.sh
./install.sh
Arissploit uninstallation
cd arissploit
chmod +x uninstall.sh
./uninstall.sh
Arissploit Framework execution
To run Arissploit Framework you should
execute the following command.
arissploit
Why Arissploit Framework
- Simple and clear UX/UI.
Arissploit Framework has a simple and clear UX/UI.
It is easy to understand and it will be easier
for you to master the Arissploit Framework.
- Good platform to start.
Arissploit Framework is a good platform to start
mastering penetration testing tools development.
- A lot of different modules.
There are a lot of different modules in Arissploit
Framework such as apache_users and arp_dos modules.
Arissploit Framework disclaimer
Usage of the Arissploit Framework for attacking targets without prior mutual consent is illegal.
It is the end user's responsibility to obey all applicable local, state, federal, and international laws.
Developers assume no liability and are not responsible for any misuse or damage caused by this program.
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].