LaRevoltage / RollerScanner
RollerScanner — Fast Port Scanner Written On Python
☆71Updated 3 years ago
Alternatives and similar repositories for RollerScanner:
Users that are interested in RollerScanner are comparing it to the libraries listed below
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- ☆19Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- Just another vulnerable web application.☆35Updated 8 months ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- ☆16Updated 2 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 4 years ago
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆16Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 5 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 2 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 4 years ago
- Pentesting notes☆17Updated last month
- A Red Teaming tool focused on profiling the target.☆26Updated 9 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- ☆33Updated 2 months ago
- ☆20Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago