Created by Jeffrey Martin via the GitHub Connector
☆26Feb 13, 2025Updated last year
Alternatives and similar repositories for metasploit-baseline-builder
Users that are interested in metasploit-baseline-builder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Created to simplify interactions with virtual machines☆84Mar 3, 2025Updated last year
- Metakitty, The Metasploit Resource Portal☆18Mar 30, 2026Updated last month
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Apr 21, 2026Updated 2 weeks ago
- MSF database code, gemified☆55Apr 21, 2026Updated 2 weeks ago
- ☆10Oct 29, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago
- python-csp provides python with communicating sequential processes style parallelism☆12Jul 13, 2021Updated 4 years ago
- Python connector library for communicating with a U2FVAL server☆15Apr 7, 2017Updated 9 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Implementation of bcrypt password hashing scheme☆13Jan 11, 2021Updated 5 years ago
- x86 Dynamic Binary Translator Library☆33Dec 19, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆15Aug 13, 2014Updated 11 years ago
- ☆11Mar 26, 2018Updated 8 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Nov 11, 2016Updated 9 years ago
- 基於 “正方软件股份有限公司” 的教務管理平台提供驗證碼識別服務(公開版)☆10Oct 4, 2018Updated 7 years ago
- ☆12Mar 29, 2019Updated 7 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 5 months ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Oauth2 plugin for graylog project☆16Oct 3, 2021Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Remotely Install the Carbon Black Sensor in Bulk, using PowerShell and PSEXEC, silently, on multiple machines.☆23Jul 17, 2020Updated 5 years ago
- ☆15Jan 24, 2021Updated 5 years ago
- MISP - Ansible installation script☆23Feb 16, 2019Updated 7 years ago
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- PyVelociraptor contains the python bindings for the Velociraptor API.☆21Updated this week
- Simple Cache Base Classes for Python.☆113Jun 29, 2012Updated 13 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 13 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- ☆23Mar 21, 2026Updated last month