Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine
☆29Feb 9, 2026Updated 3 weeks ago
Alternatives and similar repositories for metasploit-credential
Users that are interested in metasploit-credential are comparing it to the libraries listed below
Sorting:
- MSF database code, gemified☆55Updated this week
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- Rapid7 Metasploit API client library written in Ruby☆24Feb 13, 2025Updated last year
- Bluetooth Recon Script☆24Nov 3, 2015Updated 10 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- ☆24Feb 2, 2026Updated last month
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- Source Code - https://github.com/USStateDept/State-TalentMAP☆13Sep 12, 2023Updated 2 years ago
- ☆20Nov 29, 2023Updated 2 years ago
- DEPRECATED: Rapid7 Nexpose API client library written in Ruby☆151Jul 21, 2025Updated 7 months ago
- Java project using JDBC and Apache POI. It fetches data from DB and export it to excel sheet.☆10Jun 21, 2021Updated 4 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- Contract for a CryptoFiat currency☆11Aug 25, 2018Updated 7 years ago
- CrowdStrike Threat Intelligence☆35Jan 14, 2023Updated 3 years ago
- Cryptocurrency mixer☆10Jan 28, 2021Updated 5 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Documentation website source code for Concord☆15Feb 10, 2026Updated 3 weeks ago
- 🔎 Hunt down social media accounts by username across social networks☆11Mar 14, 2020Updated 5 years ago
- Generates Theos projects based on a template.☆13Dec 2, 2025Updated 3 months ago
- Dockerized EMC Solutions Enabler☆10Jul 7, 2018Updated 7 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- A stable Java API for interfacing with and extending OpenNMS☆14Jan 27, 2026Updated last month
- Linux Foundation Certified Engineer (LFCE) learning materials☆12Mar 6, 2022Updated 4 years ago
- Cloud Trust Protocol Server☆11Jan 5, 2016Updated 10 years ago
- Deprecated - This project repo is no longer being maintained.☆14Mar 15, 2023Updated 2 years ago
- termux.stable.all.deb.packages https://wae.github.io/termux.stable.all.deb.packages/☆10Jan 10, 2020Updated 6 years ago
- Competitive Coding Project☆40Oct 1, 2020Updated 5 years ago
- Flask app for connecting Munki and MicroMDM☆13Jun 17, 2022Updated 3 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Access nearly every directory from within a sandboxed application.☆23Aug 12, 2010Updated 15 years ago
- Data to test capa's code and rules.☆47Feb 17, 2026Updated 2 weeks ago
- Scraper built with Scrapy.☆18Aug 14, 2024Updated last year
- ☆10Apr 28, 2018Updated 7 years ago
- Boot from USB stick with multiple ISO files of: Ubuntu + Windows XP/7/10 + WindowsPE (windows live)☆10Jan 20, 2021Updated 5 years ago
- Code repo for the ICML 2021 paper "Making Paper Reviewing Robust to Bid Manipulation Attacks".☆10Sep 15, 2021Updated 4 years ago
- This is a prototype of a chrome extension to make it easy to quickly test Twilio API calls.☆17Aug 30, 2011Updated 14 years ago
- CGMiner fork, it add suport to Epiphany CPUs, used in Parallella.☆15Sep 23, 2013Updated 12 years ago