rapid7 / metasploit-credentialLinks
Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine
☆29Updated 3 weeks ago
Alternatives and similar repositories for metasploit-credential
Users that are interested in metasploit-credential are comparing it to the libraries listed below
Sorting:
- MSF database code, gemified☆52Updated last month
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Updated 14 years ago
- Metakitty, The Metasploit Resource Portal☆17Updated 3 months ago
- Password cracking utility☆53Updated 4 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- ☆19Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 3 years ago
- Easy Window domain access☆51Updated 11 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆124Updated 10 years ago
- Interface for the Shodan Computer Search Engine API☆24Updated 4 years ago
- Vault 7: CIA Hacking Tools Revealed☆16Updated 8 years ago
- Metasploit Framework☆28Updated 11 years ago
- ☆36Updated 6 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆91Updated 6 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago