Cyber Attack Management for Metasploit
☆13Jun 7, 2014Updated 11 years ago
Alternatives and similar repositories for armitage
Users that are interested in armitage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- cross-platform sqlmap GUI aimed to mobile devices☆49Jun 27, 2016Updated 9 years ago
- A framework for building behaviour-driven tests in fluent Java.☆35Mar 27, 2020Updated 5 years ago
- Gadget Pentesting Tool Scripts☆37Nov 29, 2015Updated 10 years ago
- Master Kali Linux, Excel in Offensive Security☆32Jun 15, 2025Updated 9 months ago
- Metakitty, The Metasploit Resource Portal☆18Feb 2, 2026Updated last month
- Unofficial api for cve.mitre.org☆40Aug 28, 2021Updated 4 years ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- Framework for learning automotive embedded software architecture and cyber security☆14Sep 4, 2018Updated 7 years ago
- Scripts that I find useful for managing MongoDB☆19Dec 19, 2017Updated 8 years ago
- Tool to predict attacker groups from the techniques and software used☆49Aug 4, 2021Updated 4 years ago
- All statistical models / machine learning / computer vision / financial models / NLP / PySpark / python techniques / library tutorials ca…☆11Nov 26, 2022Updated 3 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆12Jun 9, 2020Updated 5 years ago
- 🚗 A curated list of resources for learning about vehicle security and safety.☆19Jul 10, 2019Updated 6 years ago
- Coursera Course on Cryptography and Information Theory part of larger Applied Cryptography 🔐 Specialization by Univrsity of Colorado 🎓 …☆17Sep 17, 2020Updated 5 years ago
- Materials for OWASP presentation on malicious JavaScript☆16Aug 30, 2010Updated 15 years ago
- Converts NDJSON to JSON☆19Apr 2, 2021Updated 4 years ago
- Resources for SANS CTI Summit 2020 presentation☆20Dec 24, 2019Updated 6 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- A advanced gui for windows version of metasploit created using C# and Visual Studio. NOTE: Does not use RPC☆25Oct 28, 2019Updated 6 years ago
- A collection of game theory notebooks☆25Sep 23, 2025Updated 6 months ago
- Shell-style script to search exploit-db.com exploits.☆62Sep 7, 2024Updated last year
- Wi-Fi Scan Visualizer by Pentester Academy☆58Aug 14, 2015Updated 10 years ago
- Fundamental of information theory in computer science perspective☆19Aug 19, 2018Updated 7 years ago
- Tool that uses tavily and langraph to conduct research, then gsuite apis to organize it☆20Nov 17, 2024Updated last year
- Filter to convert json array data, and plain JSON, to NDJSON (newline delimited JSON)☆26Feb 19, 2026Updated last month
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago