Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there are no useful tools preinstalled? This is a small script which will help you to scan a network if you have nothing.
☆34Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for Port-enumeration
Users that are interested in Port-enumeration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Mar 9, 2023Updated 3 years ago
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆16Updated this week
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 6 months ago
- All my blogs for ExpDev, HTB, BinaryExploit, Etc.☆13Jul 17, 2024Updated last year
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information abo…☆1,713Jul 10, 2025Updated 9 months ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆23Mar 19, 2023Updated 3 years ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆189Apr 29, 2024Updated last year
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Mar 20, 2021Updated 5 years ago
- botnet frontend i wrote in a night and then improved over a few other nights☆13Apr 11, 2019Updated 7 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- POC for CVE-2019-14339 Canon PRINT 2.5.5☆14Sep 15, 2019Updated 6 years ago
- ☆10Mar 27, 2022Updated 4 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 10 years ago
- This program encodes text in a bitmap image (.bmp). It works by using LSB steganography which is the process of modifying the least sign…☆11Jan 13, 2020Updated 6 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- List of all pastebin.com analogs I know of. They are useful for finding leaked personal data☆22Jul 18, 2021Updated 4 years ago
- ☆11Apr 17, 2017Updated 8 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- A simple script to try and decode a string in various encoding mechanisms regardless of its (original) type.☆26Apr 11, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆391Apr 29, 2024Updated last year
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 2 months ago
- ☆13Jul 29, 2024Updated last year
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- Magical Bulk Whois (No CAPTCHA!) 🪄🪄🪄🪄🪄🚀🚀🚀🚀🚀☆15Jun 23, 2023Updated 2 years ago
- ☆36Oct 6, 2021Updated 4 years ago
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)☆14Mar 11, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Android Testing☆16Mar 24, 2014Updated 12 years ago
- Recon script for wildcard domain web scopes... (for use on synack red team)☆27Mar 31, 2023Updated 3 years ago
- https://github.com/jakejarvis/awesome-shodan-queries☆19Jan 20, 2021Updated 5 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 11 months ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- I collected it to help the bug hunter get a reward☆57Sep 7, 2022Updated 3 years ago
- Android kernel source tree for OnePlus msm8996 devices☆10Nov 24, 2017Updated 8 years ago