rapid7 / metasploit-credential
Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine
☆29Updated last week
Alternatives and similar repositories for metasploit-credential:
Users that are interested in metasploit-credential are comparing it to the libraries listed below
- MSF database code, gemified☆52Updated last week
- Metakitty, The Metasploit Resource Portal☆17Updated last week
- Metasploit Framework☆27Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆29Updated 9 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆121Updated 9 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆29Updated 11 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Password cracking utility☆53Updated 3 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆94Updated 5 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 9 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆41Updated 14 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Vault 7: CIA Hacking Tools Revealed☆15Updated 7 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 9 years ago