rapid7 / metasploit-credential
Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine
☆29Updated last month
Alternatives and similar repositories for metasploit-credential:
Users that are interested in metasploit-credential are comparing it to the libraries listed below
- MSF database code, gemified☆52Updated this week
- Metakitty, The Metasploit Resource Portal☆17Updated last month
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆121Updated 9 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 9 years ago
- Hacking environment installation scripts for OS X☆25Updated 3 years ago
- Various Wireless Driver patches☆32Updated 5 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆29Updated 11 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆29Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Post-Exploitation Framework☆75Updated 8 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆54Updated 3 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- Maltego with a twist of wireless☆25Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago