Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there are no useful tools preinstalled? This is a small script which will help you to scan a network if you have nothing.
☆34Mar 9, 2023Updated 2 years ago
Alternatives and similar repositories for Port-enumeration
Users that are interested in Port-enumeration are comparing it to the libraries listed below
Sorting:
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Mar 9, 2023Updated 2 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- All my blogs for ExpDev, HTB, BinaryExploit, Etc.☆13Jul 17, 2024Updated last year
- Magical Bulk Whois (No CAPTCHA!) 🪄🪄🪄🪄🪄🚀🚀🚀🚀🚀☆15Jun 23, 2023Updated 2 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- List of all pastebin.com analogs I know of. They are useful for finding leaked personal data☆22Jul 18, 2021Updated 4 years ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆190Apr 29, 2024Updated last year
- Data anonymization & masking of sensitive information in a relational database. Auto detection of sensitive data.☆29Nov 14, 2024Updated last year
- List of websites to search for court documents in different countries☆24Jun 1, 2022Updated 3 years ago
- ☆31Nov 26, 2025Updated 3 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 5 months ago
- A project for storing configuration files, passwords or text files with ChaCha20 encryption and Gzip compression on Telegram servers.☆24Nov 18, 2024Updated last year
- The Ukr-Books-ChatGPT-Plugin is a Python-based plugin designed to enhance the capabilities of OpenAI's ChatGPT model by integrating it wi…☆19Jul 21, 2023Updated 2 years ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆23Mar 19, 2023Updated 2 years ago
- A simple script to try and decode a string in various encoding mechanisms regardless of its (original) type.☆26Apr 11, 2021Updated 4 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆28Nov 21, 2022Updated 3 years ago
- The HPE Alletra 9000 and Primera and 3PAR PowerShell Toolkit supports cmdlets, which are wrappers around the native HPE Alletra 9000 or H…☆12Dec 21, 2022Updated 3 years ago
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆34Jan 26, 2026Updated last month
- simple bash script to earn bounties☆36Apr 27, 2024Updated last year
- A simple network stress test tool.☆14Feb 24, 2024Updated 2 years ago
- Chrome extension which sets cookies in bulk from raw header text☆13Mar 2, 2023Updated 3 years ago
- An extension for Chromium and Firefox browsers that extends magnet links on websites to enable the quick adding of torrents to Transmissi…☆13Aug 5, 2022Updated 3 years ago
- ☆10Feb 19, 2023Updated 3 years ago
- Architecture of Twint scrapper which allow download tweets on many instances without api restrictions☆10Nov 30, 2020Updated 5 years ago
- 🚀 RocketAPI PHP SDK for Instagram & Threads Private API 2025☆13Apr 22, 2025Updated 10 months ago
- Create VCF file from exported Telegram data☆11May 21, 2019Updated 6 years ago
- Быстрый бан страницы ВК☆13Sep 1, 2020Updated 5 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆16Aug 17, 2013Updated 12 years ago
- How to install macOS Big Sur on an Unsupported Mac : Example: MacBook Pro Late 2011☆10Feb 27, 2021Updated 5 years ago
- ☆13Jul 29, 2024Updated last year
- A really dumb proof of concept that bundles the nightly branch builds of all of the *arr applications into a single container.☆15Updated this week
- Website for PlayCover☆12Updated this week
- ☆16Nov 17, 2025Updated 3 months ago
- ☆11Oct 10, 2020Updated 5 years ago
- Useful scripts that I create in my free time to benefit the open source community.☆12Dec 14, 2019Updated 6 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year