amngibson / metasploit-runnerLinks
This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and perform an automated exploit against the host(s).
☆10Updated 7 years ago
Alternatives and similar repositories for metasploit-runner
Users that are interested in metasploit-runner are comparing it to the libraries listed below
Sorting:
- scan s3 buckets for security issues☆85Updated last year
- Parse HTTP Security Headers☆40Updated last year
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58Updated 10 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Updated 6 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 11 years ago
- This chef cookbook provides security configuration for mysql.☆27Updated last week
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- AWS risky security change detector based on EDDA.☆82Updated 7 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Open Source Network Security Platform☆40Updated 16 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 5 months ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 8 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 10 years ago
- Public version of PDF X-RAY☆59Updated 13 years ago
- Stochastic Traffic Factoring Utility☆15Updated 9 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Vulnerable Grails application☆43Updated 10 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 5 years ago