GossiTheDog / nmap-scriptsLinks
repository containing some nmap scripts
☆15Updated 4 years ago
Alternatives and similar repositories for nmap-scripts
Users that are interested in nmap-scripts are comparing it to the libraries listed below
Sorting:
- Wireless Pentesting Device☆22Updated 5 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- ☆28Updated last year
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆27Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- ☆13Updated 5 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 8 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- ☆46Updated 2 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated this week
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆75Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated 2 months ago
- Extract credentials and other useful info from network captures☆71Updated 2 years ago
- ☆164Updated last year
- ☆18Updated 3 years ago
- ☆114Updated 4 years ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- Protocol agnostic online password guessing API.☆83Updated 2 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 4 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆113Updated 2 years ago