rapid7 / metasploit-vagrant-builders
Build tools to generate vagrant images used by metasploit-framework CI
☆13Updated 3 months ago
Alternatives and similar repositories for metasploit-vagrant-builders
Users that are interested in metasploit-vagrant-builders are comparing it to the libraries listed below
Sorting:
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- SIP hacking tools and scripts☆22Updated 4 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- Checklists☆16Updated 8 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Search bing with python☆12Updated 10 years ago
- ☆19Updated 10 years ago
- Software exploitation training material☆15Updated 7 years ago
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Small snippets of code we often find useful☆11Updated 5 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Various exploits☆10Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated last week
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- home! sweet home☆23Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated last year
- Tool for performing lots of DNS queries quickly☆18Updated 9 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Cryptocurrencies related Security resources☆14Updated last year