IvanGlinkin / Host-enumerationLinks
Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there are no useful tools preinstalled? This is a small script which will help you to scan a network for live hosts and top 24 ports if you have nothing.
☆44Updated 2 years ago
Alternatives and similar repositories for Host-enumeration
Users that are interested in Host-enumeration are comparing it to the libraries listed below
Sorting:
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- A WLAN red team framework.☆154Updated last year
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- ☆43Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- MayorSec DNS Enumeration Tool☆89Updated last year
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 4 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- Automatic & lightning fast wordpress vulnerability scanner☆45Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- ☆72Updated 2 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Updated 4 years ago
- OWASP based Web Application Security Testing Checklist☆81Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago