|6 days ago||3 months ago|
|GNU General Public License v3.0 or later||GNU General Public License v3.0 only|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
How can I get passwords from rockyou that are only 10 characters or more?
1 project | reddit.com/r/HowToHack | 16 May 2022
I'm doing HTB Dante lab (if you have experience with this, please DM!) and I'm brute forcing a word press login with metasploit, except it keeps crashing likely due to a memory issue: https://github.com/rapid7/metasploit-framework/issues/14471
Hacking into your phone in 2022
3 projects | dev.to | 10 May 2022
Metasploit is also available for other OS. You can learn about it by clicking on this here3 projects | dev.to | 10 May 2022
We will be seeing how can you hack onto your phone in 2022 using the Metasploit Framework. This attack will be done using a Trojan created using Metasploit
Redis Sandbox Escape RCE (CVE-2022-0543) - Exploited in the wild
1 project | reddit.com/r/blueteamsec | 26 Apr 2022
INE PTP's Penetration Testing: Metasploit and ruby
1 project | reddit.com/r/netsecstudents | 26 Apr 2022
I have found devs can write metasploit module by using metasploit library for python https://github.com/rapid7/metasploit-framework/wiki/Writing-External-Python-Modules. Fourtenately, I can write python program
Synology Drive: experiences & opinions? Better alternatives?
3 projects | reddit.com/r/synology | 24 Apr 2022
From the date that the vulnerability is published, it is common knowledge, and automated scripts will start looking for vulnerable hosts. Manual exploitation is usually also possible through Metasploit. In August 2021, Synology warned about malware infecting Synology NAS boxes, and this was not the first time
PoC available for CVE's
2 projects | reddit.com/r/AskNetsec | 31 Mar 2022
Metasploit modules tend to pop up very quickly after vulns go public. Maybe look at https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits
List of good sources for vulnerabilities and emerging threats?
2 projects | reddit.com/r/cybersecurity | 24 Mar 2022
https://www.metasploit.com/ Been around for over 20 years
CVE-2022-0847 (dirtypipe) a Linux LPE for Kernel 5.8 -> 5.16 by timwr · Pull Request #16303 · landed in Metasploit
1 project | reddit.com/r/blueteamsec | 12 Mar 2022
Hikvision Unauthenticated RCE (CVE-2021-36260)
1 project | reddit.com/r/bag_o_news | 3 Mar 2022
A question about internal(network?) pentesting.
1 project | reddit.com/r/redteamsec | 6 Nov 2021
https://github.com/cobbr/Covenant https://bloodhoundgang.herokuapp.com/ https://github.com/cobbr/Covenant/wiki
Ask HN: Ever lost your love for coding? How did you get it back?
1 project | news.ycombinator.com | 12 Oct 2021
Guidance on certs in Cybersecurity Field
8 projects | reddit.com/r/cybersecurity | 11 Oct 2021
"Modern" Pentest Frameworks
2 projects | reddit.com/r/oscp | 5 Aug 2021
Thanks I will give the README a read https://github.com/cobbr/Covenant
Microsoft / Github should stop treating open-source software as malware and forcing developers to pay for certificates, if they actually care about open-source developers
5 projects | reddit.com/r/programming | 24 Jun 2021
DomainBorrowing: Not be confused with DomainFronting - This talk presents a new method to hide C2 traffic via a CDN to circumvent censorship. It details some tricks discovered in some CDN implementations, and how to chain them together to “borrow” a domain and its valid HTTPS certificate
2 projects | reddit.com/r/blueteamsec | 9 May 2021
an implementation is here - Covenant Implant Template, which uses Domain Borrowing for C2 communication. https://github.com/Dliv3/DomainBorrowing
What are some alternatives?
BeEF - The Browser Exploitation Framework Project
Empire - Empire is a PowerShell and Python post-exploitation agent.
Brakeman - A static analysis security vulnerability scanner for Ruby on Rails applications
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]
CVE-2021-1675 - C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
Rack::Attack - Rack middleware for blocking & throttling
SQLMap - Automatic SQL injection and database takeover tool
Empire - Empire is a PowerShell and Python 3.x post-exploitation framework.
pwntools - CTF framework and exploit development library
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Starkiller - Starkiller is a Frontend for PowerShell Empire.