A wrapper for Nmap to quickly run network scans
☆147Sep 23, 2020Updated 5 years ago
Alternatives and similar repositories for trigmap
Users that are interested in trigmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to automate penetration tests☆383Mar 9, 2024Updated 2 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Network Pivoting Toolkit☆457Aug 26, 2023Updated 2 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆98Aug 13, 2022Updated 3 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago
- The Shadow Attack Framework☆1,115Sep 4, 2022Updated 3 years ago
- Easy files and payloads delivery over DNS☆423Jan 3, 2026Updated 2 months ago
- DolphinChain is the first Vulnerable Blockchain Application in the world!☆16Apr 23, 2019Updated 6 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- ☆23Oct 11, 2019Updated 6 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM