rapid7 / metasploit-modelLinks
Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_data_models
☆14Updated 4 months ago
Alternatives and similar repositories for metasploit-model
Users that are interested in metasploit-model are comparing it to the libraries listed below
Sorting:
- DPE - Default Password Enumeration☆35Updated 12 years ago
- MSF database code, gemified☆53Updated 4 months ago
- Wireshark regression tests☆11Updated 4 years ago
- Tips to protect your personal and company data☆28Updated 5 years ago
- pcapdj - dispatch pcap files☆46Updated 5 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 8 years ago
- My tmux stuff☆29Updated 3 years ago
- apbleed☆24Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- ☆11Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- Node.js SDK for IBM X-Force Exchange☆14Updated 7 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Updated last year
- Open-source Exploiting Framework☆30Updated 8 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 11 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆33Updated 10 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- Network white noise collector☆19Updated 9 years ago
- This is a prototype system that uses Hadoop to process hard drive images.☆53Updated 12 years ago
- My various configuration files for zsh, vim, tmux, etc.☆25Updated 3 years ago
- The TCP Scanner☆25Updated 2 years ago
- NMAP NSE that enumerates VNC authentication types☆17Updated 14 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆41Updated 5 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆36Updated last year