rapid7 / metasploit-modelLinks
Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_data_models
☆14Updated 7 months ago
Alternatives and similar repositories for metasploit-model
Users that are interested in metasploit-model are comparing it to the libraries listed below
Sorting:
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- Wireshark regression tests☆11Updated 4 years ago
- CISOfy Handbook☆35Updated 9 years ago
- MSF database code, gemified☆54Updated 3 weeks ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- Checklists☆16Updated 9 years ago
- SIP hacking tools and scripts☆23Updated 5 years ago
- Test Suite for John the Ripper☆25Updated this week
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Network white noise collector☆19Updated 9 years ago
- My tmux stuff☆32Updated 3 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Updated 11 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- ToolsWatch and Black Hat Arsenal selection of badges☆58Updated last year
- DHCP Snooping app - great for finding rogue DHCP servers☆35Updated 7 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 3 weeks ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆15Updated 3 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆29Updated 2 years ago
- Meteor package for client + server side IMSI-catcher detection.☆21Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- apbleed☆24Updated 11 years ago
- Phishing Toolkit☆19Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- ☆17Updated last year
- My various configuration files for zsh, vim, tmux, etc.☆25Updated 3 years ago
- tcpslice concatenates multiple pcap files together, or extracts time slices from one or more pcap files.☆81Updated last month
- NMAP NSE that enumerates VNC authentication types☆17Updated 15 years ago