ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).
☆49May 21, 2025Updated 9 months ago
Alternatives and similar repositories for scanman
Users that are interested in scanman are comparing it to the libraries listed below
Sorting:
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated 2 months ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 3 years ago
- ☆11Jun 5, 2022Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Apr 17, 2022Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- Desktop pojie 存根☆10Aug 31, 2019Updated 6 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 9 months ago
- Nuclei templates which I wrote myself☆10Jan 8, 2022Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated last year
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- Password protect a static HTML page☆11Jul 10, 2021Updated 4 years ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 8 months ago
- NVD semiupdated database to be used with CVEScannerV2☆17Mar 1, 2026Updated last week
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38May 23, 2022Updated 3 years ago
- ☆12Jan 30, 2025Updated last year
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- Automating and Enhancing Nmap using Python☆17Apr 18, 2018Updated 7 years ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆19May 8, 2025Updated 10 months ago
- An android application which is useful in capturing BLE advertisement packets and storing the data collected in the phone storage as a cs…☆11Jun 29, 2017Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Open Penetration Testing Bookmarks Collection☆19Jun 9, 2015Updated 10 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Feb 7, 2016Updated 10 years ago