amngibson / metasploit-runner
This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and perform an automated exploit against the host(s).
☆10Updated 7 years ago
Alternatives and similar repositories for metasploit-runner:
Users that are interested in metasploit-runner are comparing it to the libraries listed below
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 11 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 6 years ago
- Threat Specification Language☆28Updated 9 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 8 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- A List of InfoSec Resources☆10Updated 10 years ago
- DEPRECATED - Propagate users from Mozilla's Person API to third party systems.☆40Updated 3 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- recon framework in ruby☆13Updated 13 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- Custom slash command to do a basic nmap scan from within Slack☆25Updated 8 years ago
- Defensive S3 Bucket Squating☆30Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆34Updated 7 years ago
- ☆9Updated 3 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- A tool for calculating necessary SQL Server permissions☆24Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Tools to make CI Packer builds awesome☆23Updated 9 months ago
- Hardening and Auditing Tool For Docker Hosts & Containers☆68Updated 9 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆65Updated 13 years ago