amngibson / metasploit-runnerLinks
This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and perform an automated exploit against the host(s).
☆10Updated 7 years ago
Alternatives and similar repositories for metasploit-runner
Users that are interested in metasploit-runner are comparing it to the libraries listed below
Sorting:
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- scan s3 buckets for security issues☆85Updated last year
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Parse HTTP Security Headers☆39Updated 11 months ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 12 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated last month
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Easy to use command line security scanner☆58Updated 9 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 14 years ago
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Updated 7 years ago
- Development repository for the ossec cookbook☆44Updated this week
- Ruby web application security assessment console☆62Updated 6 years ago
- ☆18Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- ☆32Updated 11 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago