Parimal-shaw / NMapifyLinks
NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified port to assist pentesters in conducting efficient network pentests.
☆58Updated 5 months ago
Alternatives and similar repositories for NMapify
Users that are interested in NMapify are comparing it to the libraries listed below
Sorting:
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Updated last week
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 7 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Dredging up secrets from the depths of the file system☆130Updated 11 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- God Mode Detection Rules☆134Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- MayorSec DNS Enumeration Tool☆88Updated 10 months ago
- Pwnspoof repository☆264Updated 2 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 5 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- ☆34Updated 2 years ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆146Updated 2 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆185Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 8 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆174Updated 3 months ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆198Updated 3 years ago
- ☆54Updated 2 weeks ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆177Updated 4 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- Canary Detection☆187Updated 4 months ago
- ☆171Updated 6 months ago