Created by Jeffrey Martin via the GitHub Connector
☆26Feb 13, 2025Updated last year
Alternatives and similar repositories for metasploit-baseline-builder
Users that are interested in metasploit-baseline-builder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Feb 9, 2026Updated last month
- MSF database code, gemified☆55Mar 5, 2026Updated 3 weeks ago
- ☆10Oct 29, 2019Updated 6 years ago
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python connector library for communicating with a U2FVAL server☆15Apr 7, 2017Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- x86 Dynamic Binary Translator Library☆33Dec 19, 2020Updated 5 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- ☆11Mar 26, 2018Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- 基於 “正方软件股份有限公司” 的教務管理平台提供驗證碼識別服務(公開版)☆10Oct 4, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Send events from G Suite to McAfee SIEM☆13Aug 23, 2019Updated 6 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 3 months ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Oauth2 plugin for graylog project☆16Oct 3, 2021Updated 4 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- Codecave miner☆14Dec 21, 2022Updated 3 years ago
- Report S3 disk usage stats, including revisions and deleted files☆16Apr 20, 2022Updated 3 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆14Feb 13, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- A fully generic, modular DSL for AWS CloudFormation☆41Oct 4, 2023Updated 2 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- Demo: https://diafygi.github.io/myLock/☆16Jul 28, 2014Updated 11 years ago
- MISP - Ansible installation script☆23Feb 16, 2019Updated 7 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- ☆18May 23, 2024Updated last year
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PyVelociraptor contains the python bindings for the Velociraptor API.☆21Feb 11, 2026Updated last month
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆44Aug 1, 2021Updated 4 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- PoC code and tools for Black Hat EU 2020☆17Dec 9, 2020Updated 5 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- ☆22Updated this week
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 7 months ago