dronesploit
python-sploitkit
dronesploit | python-sploitkit | |
---|---|---|
8 | 2 | |
1,352 | 229 | |
- | - | |
5.3 | 5.1 | |
6 months ago | 4 months ago | |
Python | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dronesploit
python-sploitkit
-
python-prompt-toolkit VS python-sploitkit - a user suggested alternative
2 projects | 15 Jan 2022
Not an alternative to Prompt Toolkit but actually a development kit relying on it ; Sploitkit allows to easily make a Metasploit-looking interface with a simple plugin architecture of modules and commands. It currently lacks documentation unfortunately...
2 projects | 15 Jan 2022Development kit for building Metasploit-like consoles
What are some alternatives?
Lucifer - A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
python-prompt-toolkit - Library for building powerful interactive command line applications in Python
zotero-cli - Tinyscript tool for sorting and exporting Zotero references based on pyzotero
python-asciistuff - :art: Library for producing ASCII arts
bbot - A recursive internet scanner for hackers.
system-design-primer - Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
ggshield - Find and fix 360+ types of hardcoded secrets and 70+ types of infrastructure-as-code misconfigurations.
haxor-news - Browse Hacker News like a haxor: A Hacker News command line interface (CLI).
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.