Write simple security regression tests for your network infrastructure.
☆19Jul 4, 2012Updated 13 years ago
Alternatives and similar repositories for metacuke
Users that are interested in metacuke are comparing it to the libraries listed below
Sorting:
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- API for Rundeck to pull host data from Foreman☆11Oct 29, 2021Updated 4 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Prevents you from committing secrets and credentials into git repositories☆20May 8, 2020Updated 5 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- A command line interface for adding tasks to Todoist.☆16Dec 7, 2022Updated 3 years ago
- 🔭 Find Hack Clubs near you!☆10Apr 18, 2019Updated 6 years ago
- Scans packages in npm and pypi for secrets☆31Nov 4, 2019Updated 6 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆28May 19, 2018Updated 7 years ago
- A simple little Python script that uses Impacket to check if SMBv1 is enabled on a remote host☆16Mar 9, 2017Updated 9 years ago
- NO LONGER USED! This is Culture Cow for HipChat. See Culture Cow code for Slack here: https://github.com/Khan/culture-cron☆17Oct 13, 2015Updated 10 years ago
- ☆13Nov 3, 2023Updated 2 years ago
- Common Findings Database☆101Jul 25, 2019Updated 6 years ago
- Experiment-management framework in Haskell☆19Aug 12, 2015Updated 10 years ago
- A simple demo getting JMX metrics from a docker container☆12Feb 3, 2016Updated 10 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Metasploit modules that didn't make it into trunk for some reason or the other☆118Jun 17, 2017Updated 8 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- ☆47Sep 3, 2025Updated 6 months ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆115Apr 16, 2016Updated 9 years ago
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- Test Kitchen driver for LXD☆10Nov 21, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Random Scripts and Tools☆14Mar 29, 2022Updated 3 years ago