Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/safebuffer/metateta
Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit
https://github.com/safebuffer/metateta
automation enumeration exploitation metasploit metasploit-framework network-security penetration-testing pentesting scanning smb
Last synced: 24 days ago
JSON representation
Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit
- Host: GitHub
- URL: https://github.com/safebuffer/metateta
- Owner: safebuffer
- Created: 2018-05-22T12:30:12.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2018-07-02T09:38:56.000Z (over 6 years ago)
- Last Synced: 2024-10-29T16:58:26.297Z (about 1 month ago)
- Topics: automation, enumeration, exploitation, metasploit, metasploit-framework, network-security, penetration-testing, pentesting, scanning, smb
- Language: Python
- Size: 6.84 KB
- Stars: 82
- Watchers: 6
- Forks: 34
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - safebuffer/metateta - Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit (Python)
README
# Metateta
Metateta Automated Tool
For Scanning And Exploiting Network Protocols Using Metasploit
For faster pen testing for large networks## What You Can Do
* Scanning with all metasploit modules for specific network Protocol like smb,smtp,snmp
* Run all Auxiliary modules against specific network Protocol* Run all Possible Metasploit Exploits for specific network Protocol `That's is not recommended for real pen testing`
* Can Run against one target or network or even text file with targets
## Using example's
run.py -R 192.168.1.15-255 -p smb -x exploitrun.py -r 192.168.1.15 -p smtp -x scan
run.py -f hosts.txt -p smb -x auxiliary
Hossam Mohamed – [@wazehell](https://twitter.com/wazehell)