ChrisTruncer / miktoLinks
Script to automate, manage, and multithread Nikto scans.
☆61Updated 5 years ago
Alternatives and similar repositories for mikto
Users that are interested in mikto are comparing it to the libraries listed below
Sorting:
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Search drives for documents containing passwords☆63Updated 11 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 9 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆68Updated 3 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 5 years ago
- Small scripts to assist in pentesting☆19Updated 4 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 4 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆20Updated 5 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- ☆82Updated last year
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Search public IP owner through ARIN☆59Updated 4 months ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Updated 6 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- scripts for pentesting☆88Updated 7 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆36Updated 10 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago