amngibson / metasploit-runnerLinks
This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and perform an automated exploit against the host(s).
☆10Updated 8 years ago
Alternatives and similar repositories for metasploit-runner
Users that are interested in metasploit-runner are comparing it to the libraries listed below
Sorting:
- Parse HTTP Security Headers☆40Updated last year
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 8 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 4 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- scan s3 buckets for security issues☆86Updated last year
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Easy to use command line security scanner☆58Updated 9 years ago
- miscellaneous scripts and things...☆22Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Updated 4 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 8 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆46Updated 7 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13Updated 9 years ago
- Development repository for the ossec cookbook☆44Updated 2 months ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- This chef cookbook provides security configuration for mysql.☆27Updated last week
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆68Updated 14 years ago
- Vulnerable Grails application☆43Updated 10 years ago
- AWS risky security change detector based on EDDA.☆82Updated 7 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 7 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago