This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and perform an automated exploit against the host(s).
☆10Dec 13, 2017Updated 8 years ago
Alternatives and similar repositories for metasploit-runner
Users that are interested in metasploit-runner are comparing it to the libraries listed below
Sorting:
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- Minion Frontend☆30Mar 28, 2019Updated 6 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Simple (web-) application vulnerability management system☆21Aug 14, 2014Updated 11 years ago
- ☆38Jun 19, 2019Updated 6 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- DEPRECATED - TLS regression scanner for Firefox☆19Dec 16, 2022Updated 3 years ago
- INACTIVE - http://mzl.la/ghe-archive - Minion Backend☆40Mar 28, 2019Updated 6 years ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 3 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- async parser for JET☆25Nov 14, 2025Updated 3 months ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Mar 9, 2022Updated 3 years ago
- Simple HTTP server for testing HTML5 media with rate limiting and simulation of live streaming☆33Nov 1, 2017Updated 8 years ago
- Automate SSH key management☆66Oct 26, 2022Updated 3 years ago
- ☆29Jan 19, 2023Updated 3 years ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- ☆10Aug 4, 2020Updated 5 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- The Parasite Toolkit☆33Updated this week
- ☆29Apr 28, 2017Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- CVE-2021-4034 POC exploit☆36Jan 28, 2022Updated 4 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Jan 19, 2016Updated 10 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Mar 15, 2013Updated 12 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- A model to predict river water temperature (RWT) using air temperature and discharge☆10Dec 11, 2017Updated 8 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Useful scripts that I create in my free time to benefit the open source community.☆12Dec 14, 2019Updated 6 years ago