Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_data_models
☆15Apr 14, 2026Updated last month
Alternatives and similar repositories for metasploit-model
Users that are interested in metasploit-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Tool installing Metasploit☆14Sep 16, 2023Updated 2 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 7 months ago
- MSF database code, gemified☆56Apr 21, 2026Updated last month
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆30May 11, 2026Updated last week
- PS4 NOR Flashing tool for the Teensy 4.1☆18Aug 7, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Metasploit Installer By Mr.IM81☆22Nov 18, 2019Updated 6 years ago
- Cryptocurrency mixer☆10Jan 28, 2021Updated 5 years ago
- TUI Wallet for Monero – the secure, private, untraceable cryptocurrency☆12Apr 13, 2025Updated last year
- In this Thread, I`m gonna show you how to install Metasploit Framework in TermuX. You can use it for Android to Android/Windows hacking. …☆27Aug 13, 2019Updated 6 years ago
- A network packet synthesis language☆24Apr 30, 2026Updated 3 weeks ago
- Simple Installer for Whonix-Starter to setup and configure Whonix with VirtualBox☆25Updated this week
- ☆20Aug 4, 2022Updated 3 years ago
- udev rules and helpful programs to defend your system☆22Jul 29, 2012Updated 13 years ago
- Secure file erasing utility for Mac OS X☆22Sep 11, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆48Apr 14, 2026Updated last month
- Mastering Metasploit - Third Edition, published by Packt☆44Jan 15, 2021Updated 5 years ago
- Rex library for dealing with Powershell Scripts☆54Aug 4, 2025Updated 9 months ago
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- Obscuro: A Secure and Anonymous Bitcoin Mixer using SGX☆19Oct 22, 2020Updated 5 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated last month
- pfSense MCP Server enables security administrators to manage their pfSense firewalls using natural language through AI assistants like Cl…☆71Mar 27, 2026Updated last month
- public domain usb hacking logos☆12Sep 23, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- I2P monitor and control application for Mac OS X☆11Jul 10, 2016Updated 9 years ago
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆15Feb 24, 2021Updated 5 years ago
- hacking tools awesome lists☆17Jul 26, 2017Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Script to run after a Debian based install (Ubuntu, Kali, Raspberry Pi...)☆10Sep 20, 2025Updated 8 months ago
- Cocos Creator 3.x 消消乐☆13Feb 8, 2023Updated 3 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- A cryptographically secure pin code generator for NodeJS☆14Feb 27, 2023Updated 3 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Oct 26, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆16Dec 8, 2022Updated 3 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- OCaml adapters for crypto providers used in Everest☆10Sep 13, 2018Updated 7 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Chrome extension: password generator from master key using PBKDF2 with SHA-256.☆19Sep 14, 2015Updated 10 years ago
- Listen in on TCP conversations on the network your computer is attached to☆18Jan 15, 2023Updated 3 years ago