maus- / vagrant-metasploitLinks
Vagrant Box that will deploy a bare ubuntu box (vmware or virtualbox) and install MSF on top.
☆38Updated 3 years ago
Alternatives and similar repositories for vagrant-metasploit
Users that are interested in vagrant-metasploit are comparing it to the libraries listed below
Sorting:
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- ☆71Updated 9 years ago
- ☆58Updated 8 years ago
- 🗃️ This repository has been integrated into mitmproxy/mitmproxy.☆53Updated 7 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- ☆27Updated 12 years ago
- Cartero - Social Engineering Framework☆170Updated 5 years ago
- ☆73Updated 12 years ago
- Kali Linux, built from initial Debian Jessie, using Vagrant, for deployment to Amazon☆17Updated 8 years ago
- Reverse proxy for HTTPS services, with SSL verification.☆60Updated last year
- Code for installing various security minded tools onto Vagrant powered virtual machines☆172Updated 10 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 10 years ago
- INACTIVE - http://mzl.la/ghe-archive - Minion Backend☆40Updated 6 years ago
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 9 years ago
- Ansible Provisioned Security Testing Platform☆17Updated 8 years ago
- A security scanner for Wordpress blogging engine☆32Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- A malware/botnet analysis framework written in Ruby.☆196Updated last year
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Db Database Assessment Tool☆209Updated 7 years ago
- Check UNIX/Linux systems for privilege escalation☆124Updated 9 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- A PHP class to calculate the combination for a masterlock using a technique discovered by Samy Kamkar (http://null-byte.wonderhowto.com/h…☆23Updated last year
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Use https://github.com/fuzzdb-project/fuzzdb project☆94Updated 9 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Go library and command line to seek for secrets on various sources.☆241Updated 5 years ago
- Django Web UI contributed by Yandex for w3af.☆51Updated 10 years ago