rapid7-cookbooks / nexposeView external linksLinks
This cookbook installs Nexpose
☆12Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for nexpose
Users that are interested in nexpose are comparing it to the libraries listed below
Sorting:
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A lightweight authentication proxy for HTTP services☆17Nov 28, 2023Updated 2 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- SecNews☆16Dec 30, 2018Updated 7 years ago
- Simple (web-) application vulnerability management system☆21Aug 14, 2014Updated 11 years ago
- Dockerfile for BeEF (the Browser Exploitation Framework) build☆18Mar 8, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 14 years ago
- Php Codz Hacking☆21Sep 5, 2015Updated 10 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Oct 30, 2013Updated 12 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 9 years ago
- In this work, we compared the predictive capabilities of six different machine learning algorithms - linear regression, random forest, ex…☆14Sep 21, 2020Updated 5 years ago
- Integrate static security testing with HCL AppScan on Cloud using GitHub Actions☆11May 15, 2025Updated 9 months ago
- Scripts, SQL queries, and other resources for Nexpose☆30Mar 3, 2025Updated 11 months ago
- Bash-completion script for Nmap☆72May 24, 2017Updated 8 years ago
- Metasploit Framework☆26Updated this week
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 10 years ago
- ☆40Feb 23, 2016Updated 9 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- MWO Issue Tracker☆17Aug 22, 2017Updated 8 years ago
- Easy to use command line security scanner☆58Feb 27, 2016Updated 9 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 2 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER ma…☆36Aug 7, 2025Updated 6 months ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Advanced XPath Injection Tool☆33Jan 29, 2026Updated 2 weeks ago
- Development repository for the rsyslog cookbook☆65Jan 6, 2026Updated last month
- Files to make FFXI Beautiful☆10Jan 9, 2022Updated 4 years ago
- ☆24Jan 31, 2024Updated 2 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- PHP root (suid) reverse shell☆74Jun 22, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago