rapid7 / metasploit-credentialLinks
Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine
☆29Updated 3 months ago
Alternatives and similar repositories for metasploit-credential
Users that are interested in metasploit-credential are comparing it to the libraries listed below
Sorting:
- MSF database code, gemified☆55Updated 3 weeks ago
- A copy of articles published at Peerlyst☆42Updated 9 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Updated 15 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Updated 6 years ago
- Metakitty, The Metasploit Resource Portal☆17Updated 2 months ago
- ☆38Updated 6 years ago
- Password cracking utility☆54Updated 4 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆124Updated 10 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Various Wireless Driver patches☆34Updated 6 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 9 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- ☆84Updated 2 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆47Updated 10 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 12 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Updated 9 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆87Updated 6 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 11 years ago
- Useful pentesting scripts☆84Updated 11 months ago
- Metasploit things, modules, plugins, exploits☆26Updated 11 years ago