Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there are no useful tools preinstalled? This is a small script which will help you to scan a network for live hosts and top 24 ports if you have nothing.
☆44Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for Host-enumeration
Users that are interested in Host-enumeration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 7 years ago
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆391Apr 29, 2024Updated 2 years ago
- ☆36Oct 6, 2021Updated 4 years ago
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆16Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- All my blogs for ExpDev, HTB, BinaryExploit, Etc.☆13Jul 17, 2024Updated last year
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information abo…☆1,719Jul 10, 2025Updated 9 months ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- ☆11Apr 21, 2022Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Scripts to automate RECON process☆11Aug 31, 2025Updated 8 months ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Mar 20, 2021Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- It is all in One Pentesting tool . It Has modules , Information Gathering exploitation + vulnerability scanning , proxy scraper and wo…☆19Apr 6, 2025Updated last year
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 10 years ago
- Demon Pentest Shell☆15Aug 4, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A lightweight and useful config of PowerShell.☆13Feb 16, 2020Updated 6 years ago
- This program encodes text in a bitmap image (.bmp). It works by using LSB steganography which is the process of modifying the least sign…☆11Jan 13, 2020Updated 6 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Jun 28, 2021Updated 4 years ago
- carbanak\group_ib_smart_boys☆11Jul 12, 2018Updated 7 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- A simple script to try and decode a string in various encoding mechanisms regardless of its (original) type.☆26Apr 11, 2021Updated 5 years ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- ☆13Jul 29, 2024Updated last year
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Jun 27, 2015Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- My collection of self-written exploits☆24Mar 25, 2022Updated 4 years ago
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆21Mar 5, 2020Updated 6 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆22Jun 9, 2019Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- List of websites to search for court documents in different countries☆24Jun 1, 2022Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago