DEPRECATED: Rapid7 Nexpose API client library written in Ruby
☆152Jul 21, 2025Updated 9 months ago
Alternatives and similar repositories for nexpose-client
Users that are interested in nexpose-client are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- generic scripts for managing nexpose☆15Feb 20, 2019Updated 7 years ago
- DEPRECATED : Rapid7 Nexpose API client library written in Python☆24Jun 6, 2018Updated 7 years ago
- Scripts, SQL queries, and other resources for Nexpose☆30Mar 3, 2025Updated last year
- The UNOFFICIAL (but useful) Ruby gem for the Rapid7 InsightVM/Nexpose RESTful API☆14Sep 12, 2024Updated last year
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆209Apr 12, 2018Updated 8 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- Nexpose Community vulnerability checks☆34Aug 18, 2020Updated 5 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- ☆10Mar 29, 2022Updated 4 years ago
- cSploit traffic manipulator☆32Aug 3, 2017Updated 8 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- The most feature complete PowerShell module available for the Rapid7 Nexpose/InsightVM APIv3☆62Mar 17, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Basic script to rotate through reverse SSH proxies built through EC2, useful for obfuscating (weakly anonymizing) your source. Nice for b…☆13Mar 6, 2015Updated 11 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- ☆22Feb 13, 2025Updated last year
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 4 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆90Nov 30, 2022Updated 3 years ago
- YAML data sources for metasploit.github.io☆20Apr 12, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 10 years ago
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆18Apr 8, 2022Updated 4 years ago
- The NSA wants access to your all your data, might as well make it easier for them to access the backend of your WordPress install. When …☆27Nov 2, 2016Updated 9 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago