BlWasp / nmapCTFLinks
A Nmap script optimized for Hack the Box and CTFs
☆13Updated 4 years ago
Alternatives and similar repositories for nmapCTF
Users that are interested in nmapCTF are comparing it to the libraries listed below
Sorting:
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Collection of GoPhish templates available for legitimate usage.☆156Updated 2 years ago
- For OSCP !☆11Updated 5 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆296Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆108Updated 2 years ago
- Automated rogue access point setup tool.☆197Updated 4 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 6 years ago
- ☆42Updated 3 years ago
- A tool for enumerating usernames from text, files, or websites☆81Updated 3 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆113Updated last year
- A toolkit for your red team operations☆27Updated 3 years ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆13Updated 3 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆11Updated 4 years ago
- blue team, red team stuff. All things cyber ;)☆78Updated 2 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- Python Gmail User Enumeration Tool☆2Updated last week
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated 11 months ago
- Notes only☆19Updated 3 years ago
- A WLAN red team framework.☆156Updated 9 months ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆54Updated 4 years ago
- ☆123Updated last year
- Scripts to set up Kali Linux with additional tools, and maintain them.☆63Updated last year
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago