nessus plugin for metasploit to connect to a nessus server
☆23May 1, 2013Updated 13 years ago
Alternatives and similar repositories for Nessus-Bridge-for-Metasploit
Users that are interested in Nessus-Bridge-for-Metasploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- Rapid7 Metasploit API client library written in Ruby☆25Feb 13, 2025Updated last year
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Snake game for ESP32 and ILI9341 screen☆12Jul 22, 2017Updated 8 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆30Nov 8, 2012Updated 13 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Plugins for Metasploit Framework☆488Jan 18, 2019Updated 7 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Python Powered Repository☆15Jan 22, 2020Updated 6 years ago
- Maltego transform for visualizing Nessus scan data☆45Dec 11, 2019Updated 6 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆90Nov 30, 2022Updated 3 years ago
- Simple Chrome Extension to Add Check Marks in Gmail ✓✓☆11May 3, 2018Updated 7 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Control the Mac Finder from the Terminal☆102Dec 28, 2012Updated 13 years ago
- A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.☆15Oct 21, 2019Updated 6 years ago
- 64-bit TrueCrypt on macOS.☆17Nov 12, 2024Updated last year
- Web application to faciliate benchmarking and testing SIP based services☆19Apr 19, 2016Updated 10 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 6 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago
- Shell scripts for creating redistributable packages of CGMiner and BFGMiner for Mac OS X☆55Feb 3, 2018Updated 8 years ago
- ☆19Jan 27, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Fast Golang Tool To Get Cname For Domains and Subdomain☆16Feb 7, 2025Updated last year
- ☆13May 17, 2016Updated 9 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- ICS busybox based on 1.20 with blkid and ext4 support added☆15May 11, 2012Updated 13 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- WEB 跨域postMessage() 漏洞挖掘工具,基本原理:使用AJAX 获取页面代码,结合iframe 和data 协议构造测试环境,然后在iframe 下的window.onmessage 中插入hook 监控onmessage 的参数,最后通过能否被原来的onme…☆11Sep 13, 2016Updated 9 years ago