rapid7 / metasploit-modelLinks
Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_data_models
☆14Updated 5 months ago
Alternatives and similar repositories for metasploit-model
Users that are interested in metasploit-model are comparing it to the libraries listed below
Sorting:
- Tips to protect your personal and company data☆27Updated 5 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- CISOfy Handbook☆34Updated 9 years ago
- Wireshark regression tests☆11Updated 4 years ago
- MSF database code, gemified☆54Updated 5 months ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Checklists☆16Updated 9 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 9 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- Phishing Toolkit☆20Updated 7 years ago
- ☆11Updated 8 years ago
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆50Updated last year
- ☆15Updated 2 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- Forensics Science Education☆11Updated 4 years ago
- Node.js SDK for IBM X-Force Exchange☆15Updated 7 years ago
- This is a prototype system that uses Hadoop to process hard drive images.☆54Updated 13 years ago
- socat version 2☆10Updated 13 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 11 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Network white noise collector☆19Updated 9 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- tcpslice concatenates multiple pcap files together, or extracts time slices from one or more pcap files.☆78Updated last month
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆23Updated 4 years ago
- ☆36Updated 10 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago