Beyarz / PortforgeLinks
Lightweight utility to fool port scanners
☆32Updated 5 years ago
Alternatives and similar repositories for Portforge
Users that are interested in Portforge are comparing it to the libraries listed below
Sorting:
- A scanner for taking basic fingerprints☆50Updated 5 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Updated 6 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Updated 5 years ago
- wordpress hash cracker .☆66Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Updated 2 years ago
- Minimalistic DNS logging tool☆43Updated 4 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 8 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- Tool to brute website sub-domains and dirs.☆49Updated 5 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 8 months ago
- A tool for recover router password☆33Updated 7 years ago
- Using IPv6 to Bypass Security☆92Updated 5 months ago
- a hash query tool☆36Updated 6 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- ☆49Updated 5 years ago
- Multithreaded drupalgeddon2 scanner☆12Updated 7 years ago
- ☆26Updated 3 years ago
- Automate Metasploit scanning and exploitation☆117Updated 6 months ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Updated 7 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Updated 6 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 3 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 9 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 5 years ago
- ☆62Updated 3 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago