BlWasp / nmapCTF
A Nmap script optimized for Hack the Box and CTFs
☆10Updated 3 years ago
Related projects: ⓘ
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆72Updated 3 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆28Updated 4 years ago
- A BASH script to automate simple tasks related to static malware analysis☆10Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆93Updated last year
- Subdomain Bruteforce - Bounty Quick Code☆28Updated 2 weeks ago
- ☆38Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆20Updated 2 years ago
- ☆53Updated this week
- thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TV's, Fridge…☆59Updated 10 months ago
- A reverse TCP payload and listener both written in python3.☆32Updated 3 months ago
- Pentesting Tools to Automatize Active Directory Hacking☆12Updated 2 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆41Updated last year
- ☆76Updated this week
- This repository contains the files that provide the upload functionality in the IIS Server☆26Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆101Updated 3 months ago
- Twitter Eye is a Twitter Information Gathering Tool With Twitter Eye, you can search with various keywords and usernames on Twitter. Then…☆43Updated 2 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆67Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆92Updated last year
- Tactics, Techniques, and Procedures☆19Updated 6 months ago
- Automated rogue access point setup tool.☆190Updated 3 years ago
- An OSINT focused tool made with Nodejs!☆84Updated last year
- ☆38Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆52Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆34Updated last year
- A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆45Updated 3 years ago
- Find exploits in local and online database☆69Updated 3 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆11Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆49Updated 3 years ago