Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_data_models
☆14Apr 14, 2026Updated 2 weeks ago
Alternatives and similar repositories for metasploit-model
Users that are interested in metasploit-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Tool installing Metasploit☆14Sep 16, 2023Updated 2 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 7 months ago
- MSF database code, gemified☆55Apr 21, 2026Updated last week
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Apr 21, 2026Updated last week
- PS4 NOR Flashing tool for the Teensy 4.1☆16Aug 7, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Metasploit Installer By Mr.IM81☆22Nov 18, 2019Updated 6 years ago
- Cryptocurrency mixer☆10Jan 28, 2021Updated 5 years ago
- TUI Wallet for Monero – the secure, private, untraceable cryptocurrency☆12Apr 13, 2025Updated last year
- In this Thread, I`m gonna show you how to install Metasploit Framework in TermuX. You can use it for Android to Android/Windows hacking. …☆27Aug 13, 2019Updated 6 years ago
- A network packet synthesis language☆23Updated this week
- Simple Installer for Whonix-Starter to setup and configure Whonix with VirtualBox☆25Apr 12, 2026Updated 2 weeks ago
- ☆20Aug 4, 2022Updated 3 years ago
- udev rules and helpful programs to defend your system☆22Jul 29, 2012Updated 13 years ago
- Secure file erasing utility for Mac OS X☆22Sep 11, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆48Apr 14, 2026Updated 2 weeks ago
- Mastering Metasploit - Third Edition, published by Packt☆44Jan 15, 2021Updated 5 years ago
- Rex library for dealing with Powershell Scripts☆53Aug 4, 2025Updated 8 months ago
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- Obscuro: A Secure and Anonymous Bitcoin Mixer using SGX☆19Oct 22, 2020Updated 5 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated 2 weeks ago
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆14Feb 24, 2021Updated 5 years ago
- public domain usb hacking logos☆12Sep 23, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- I2P monitor and control application for Mac OS X☆11Jul 10, 2016Updated 9 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Script to run after a Debian based install (Ubuntu, Kali, Raspberry Pi...)☆10Sep 20, 2025Updated 7 months ago
- Cocos Creator 3.x 消消乐☆13Feb 8, 2023Updated 3 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- A cryptographically secure pin code generator for NodeJS☆14Feb 27, 2023Updated 3 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Oct 26, 2018Updated 7 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆16Dec 8, 2022Updated 3 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- OCaml adapters for crypto providers used in Everest☆10Sep 13, 2018Updated 7 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Chrome extension: password generator from master key using PBKDF2 with SHA-256.☆19Sep 14, 2015Updated 10 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Listen in on TCP conversations on the network your computer is attached to☆18Jan 15, 2023Updated 3 years ago