rapid7 / metasploit-credentialLinks
Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine
☆29Updated 4 months ago
Alternatives and similar repositories for metasploit-credential
Users that are interested in metasploit-credential are comparing it to the libraries listed below
Sorting:
- MSF database code, gemified☆55Updated last week
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆47Updated 10 years ago
- Various Kali Scripts☆60Updated 9 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Updated 15 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- ☆38Updated 6 years ago
- Metasploit Framework☆29Updated 12 years ago
- Maltego with a twist of wireless☆26Updated 11 years ago
- A copy of articles published at Peerlyst☆43Updated 9 years ago
- Metakitty, The Metasploit Resource Portal☆17Updated last week
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- Simple security surveillance script for linux distributions.☆59Updated 9 years ago
- Ruby script for spoofing SMTP emails.☆44Updated 2 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 10 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Updated 10 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 5 years ago
- Useful pentesting scripts☆86Updated last year
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Updated 10 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆102Updated 3 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 12 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- ☆84Updated 2 years ago