IvanGlinkin / Host-enumerationLinks
Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there are no useful tools preinstalled? This is a small script which will help you to scan a network for live hosts and top 24 ports if you have nothing.
☆43Updated 2 years ago
Alternatives and similar repositories for Host-enumeration
Users that are interested in Host-enumeration are comparing it to the libraries listed below
Sorting:
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Updated 2 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 4 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- A simple place to learn XSS☆31Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Information-Gathering Shell Script☆30Updated 4 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Create visualization from Shodan query☆74Updated 4 years ago
- ☆42Updated 3 years ago
- Cheat-Sheet of tools for penetration testing☆55Updated 2 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆71Updated 3 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Updated 4 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆80Updated 4 years ago
- The purpose of this script is to automate the web enumeration process and search for exploits☆114Updated 3 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 4 years ago
- A WLAN red team framework.☆156Updated 9 months ago
- ☆70Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 7 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- ☆44Updated 9 years ago
- Subdomain Bruteforce - Bounty Quick Code☆31Updated 10 months ago
- Dorks for Google, Shodan and BinaryEdge☆144Updated 5 years ago