rapid7 / metasploit-modelLinks
Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_data_models
☆14Updated last month
Alternatives and similar repositories for metasploit-model
Users that are interested in metasploit-model are comparing it to the libraries listed below
Sorting:
- Test Suite for John the Ripper☆24Updated 3 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Wireshark regression tests☆11Updated 4 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- The TCP Scanner☆24Updated 2 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Phishing Toolkit☆20Updated 7 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Checklists☆16Updated 8 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- apbleed☆24Updated 10 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- Interface for the Shodan Computer Search Engine API☆24Updated 4 years ago
- Search bing with python☆12Updated 10 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated 2 weeks ago