rapid7 / metasploit_data_modelsLinks
MSF database code, gemified
☆52Updated 2 months ago
Alternatives and similar repositories for metasploit_data_models
Users that are interested in metasploit_data_models are comparing it to the libraries listed below
Sorting:
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- ☆78Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Dependencies for Veil 3☆17Updated 8 years ago
- A web app scanner☆26Updated 11 years ago
- Oracle Database 12c password brute forcer☆29Updated 10 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 10 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated 2 months ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30Updated 10 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Virtual host brute forcer☆22Updated 11 years ago
- Projects and POCs☆60Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago