Phactive - Monitoring an Environment with Nmap red teaming
☆12May 11, 2019Updated 7 years ago
Alternatives and similar repositories for phactive
Users that are interested in phactive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- ☆23May 20, 2016Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 12 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆12Jul 28, 2019Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Mass Triage Tools☆20Mar 10, 2026Updated 2 months ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- ☆11Jun 19, 2024Updated last year
- Welcome to OSCP!!!☆14Jan 30, 2020Updated 6 years ago
- this tool take a list of subdomains and give you the ip for each☆20Oct 9, 2020Updated 5 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 10 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 8 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54May 15, 2021Updated 5 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 9 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 12 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 9 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Simple NTFS crawler.☆57Aug 3, 2017Updated 8 years ago
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 5 years ago