A wrapper for Nmap to quickly run network scans
☆147Sep 23, 2020Updated 5 years ago
Alternatives and similar repositories for trigmap
Users that are interested in trigmap are comparing it to the libraries listed below
Sorting:
- A tool to automate penetration tests☆382Mar 9, 2024Updated last year
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Network Pivoting Toolkit☆457Aug 26, 2023Updated 2 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Test Blue Team detections without running any attack.☆271May 2, 2024Updated last year
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104May 4, 2019Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Easy files and payloads delivery over DNS☆422Jan 3, 2026Updated 2 months ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Apr 23, 2019Updated 6 years ago
- Python API wrapper and command-line client for the tools hosted on spyse.com.☆271Aug 18, 2020Updated 5 years ago
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆913Jun 22, 2019Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- network visualization & pentest reporting☆532May 2, 2023Updated 2 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117May 23, 2019Updated 6 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Feb 23, 2026Updated last week
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Fast directory scanning and scraping tool☆630Feb 5, 2026Updated 3 weeks ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago