rapid7 / metasploit-modelLinks
Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_data_models
☆14Updated 9 months ago
Alternatives and similar repositories for metasploit-model
Users that are interested in metasploit-model are comparing it to the libraries listed below
Sorting:
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- The TCP Scanner☆26Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last month
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- apbleed☆23Updated 11 years ago
- Checklists☆16Updated 9 years ago
- SIP hacking tools and scripts☆23Updated 5 years ago
- MSF database code, gemified☆55Updated this week
- Phishing Toolkit☆19Updated 7 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- Example packet.proxy plugins.☆22Updated 5 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 14 years ago
- Wireshark regression tests☆11Updated 5 years ago
- Test Suite for John the Ripper☆25Updated last month
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Oracle Database 12c password brute forcer☆29Updated 10 years ago
- Gets Reverse DNS, GeoIP, NMAP, Traceroute and pulls HTTP Headers for an IP address.☆21Updated 10 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- CISOfy Handbook☆35Updated 9 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated 4 months ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- My various configuration files for zsh, vim, tmux, etc.☆25Updated 3 years ago
- NMAP NSE that enumerates VNC authentication types☆17Updated 15 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆25Updated 4 years ago