Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_data_models
☆14May 2, 2025Updated 10 months ago
Alternatives and similar repositories for metasploit-model
Users that are interested in metasploit-model are comparing it to the libraries listed below
Sorting:
- This Tool installing Metasploit☆14Sep 16, 2023Updated 2 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- MSF database code, gemified☆55Mar 5, 2026Updated 2 weeks ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Feb 9, 2026Updated last month
- PS4 NOR Flashing tool for the Teensy 4.1☆16Aug 7, 2024Updated last year
- Metasploit Installer By Mr.IM81☆22Nov 18, 2019Updated 6 years ago
- Cryptocurrency mixer☆10Jan 28, 2021Updated 5 years ago
- TUI Wallet for Monero – the secure, private, untraceable cryptocurrency☆12Apr 13, 2025Updated 11 months ago
- In this Thread, I`m gonna show you how to install Metasploit Framework in TermuX. You can use it for Android to Android/Windows hacking. …☆27Aug 13, 2019Updated 6 years ago
- A network packet synthesis language☆23Mar 5, 2026Updated 2 weeks ago
- Simple Installer for Whonix-Starter to setup and configure Whonix with VirtualBox☆19Mar 14, 2026Updated last week
- ☆20Aug 4, 2022Updated 3 years ago
- udev rules and helpful programs to defend your system☆22Jul 29, 2012Updated 13 years ago
- ☆48Feb 4, 2026Updated last month
- Secure file erasing utility for Mac OS X☆22Sep 11, 2021Updated 4 years ago
- Mastering Metasploit - Third Edition, published by Packt☆43Jan 15, 2021Updated 5 years ago
- Rex library for dealing with Powershell Scripts☆53Aug 4, 2025Updated 7 months ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- Obscuro: A Secure and Anonymous Bitcoin Mixer using SGX☆20Oct 22, 2020Updated 5 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆13Feb 24, 2021Updated 5 years ago
- public domain usb hacking logos☆12Sep 23, 2021Updated 4 years ago
- I2P monitor and control application for Mac OS X☆11Jul 10, 2016Updated 9 years ago
- Synchronizable PBKDF2 based password generator☆14Dec 31, 2016Updated 9 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Script to run after a Debian based install (Ubuntu, Kali, Raspberry Pi...)☆10Sep 20, 2025Updated 6 months ago
- Cocos Creator 3.x 消消乐☆13Feb 8, 2023Updated 3 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- A cryptographically secure pin code generator for NodeJS☆14Feb 27, 2023Updated 3 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Oct 26, 2018Updated 7 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆16Dec 8, 2022Updated 3 years ago
- OCaml adapters for crypto providers used in Everest☆10Sep 13, 2018Updated 7 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Chrome extension: password generator from master key using PBKDF2 with SHA-256.☆19Sep 14, 2015Updated 10 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Listen in on TCP conversations on the network your computer is attached to☆18Jan 15, 2023Updated 3 years ago