amngibson / metasploit-runner
This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and perform an automated exploit against the host(s).
☆10Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for metasploit-runner
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 9 years ago
- A List of InfoSec Resources☆10Updated 10 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- recon framework in ruby☆13Updated 12 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 11 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- Tools to make CI Packer builds awesome☆23Updated 5 months ago
- Fingerprint server side technology☆28Updated 11 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- A Ruby interface to sslyze python utility.☆13Updated last year
- AWS EC2 and S3 Security Auditing Tool☆41Updated 10 years ago
- Defensive S3 Bucket Squating☆30Updated 6 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- An application for distributing oclHashcat tasks.☆21Updated 9 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆24Updated 10 years ago
- Phishing Toolkit☆19Updated 6 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 10 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Threat Specification Language☆28Updated 9 years ago
- ☆32Updated 10 years ago
- Passive Bitcoin Project☆10Updated 9 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 2 years ago