no one is safe ...

some more Metasploit resource files :)

"Once you've snagged credentials with these and other modules, open source contributor m-1-k-3 has supplied a nifty new resource script, auto_cred_checker.rc. This script runs through all the credentials currently in the Metasploit database and validates them by loading up the appropriate service login auxiliary module and giving the creds a shot. Super cool."

"m-1-k-3 also provided two new resource scripts, basic_discovery.rc used to automate port scanning), and multi_post.rc, which automates a bunch of common post-exploitation tasks."

Source: https://community.rapid7.com/community/solutions/metasploit/blog/2012/02...

"In scripts, community contributor m-1-k-3 submitted auto_pass_the_hash.rc, which is a simple rc-script implementation of the tried-and-true Pass the Hash SMB authentication attack, and wmap_autotest.rc, an automated means to step through collected web pages using Efrain Torres' wmap plugin for all the heavy lifting."

Source: https://community.rapid7.com/community/solutions/metasploit/blog/2012/01...

"Metasploit community contributor m-1-k-3 committed three new example resource scripts: portscan.rc and port_cleaner.rc, which help to automate up the Metasploit-Nmap integration and tidies up the database by dropping uninteresting closed port records. He also provides his autocrawler.rb script, which targets all hosts in the current workspace that have a running HTTP service and records their linked pages for later analysis."

Source: https://community.rapid7.com/community/solutions/metasploit/blog/2012/01...