rapid7 / metasploit-modelLinks
Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_data_models
☆14Updated 3 months ago
Alternatives and similar repositories for metasploit-model
Users that are interested in metasploit-model are comparing it to the libraries listed below
Sorting:
- Tips to protect your personal and company data☆28Updated 5 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- MSF database code, gemified☆52Updated 3 months ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- Forensics Science Education☆11Updated 4 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆23Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- apbleed☆24Updated 11 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- ☆11Updated 8 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- CISOfy Handbook☆32Updated 8 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Updated last year
- Open Standard Vulnerability & Compliance Scanner☆44Updated 9 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated last year
- ☆18Updated last year
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17Updated 6 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆12Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Checklists☆17Updated 8 years ago
- Wireshark regression tests☆11Updated 4 years ago
- THOR APT Scanner User Manual☆18Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Updated 8 months ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Phishing Toolkit☆20Updated 7 years ago