☆35Mar 19, 2022Updated 4 years ago
Alternatives and similar repositories for NetworkAttackMap
Users that are interested in NetworkAttackMap are comparing it to the libraries listed below
Sorting:
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A set of helper scripts, to be used with jlib to help parsing domains.☆27Oct 21, 2020Updated 5 years ago
- Java Basic Codes for Beginner to Advance, Here you will get Java Programming codes with examples by GitCodeSwetabh☆10Oct 2, 2020Updated 5 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- MCP Parasite☆46Feb 20, 2026Updated last month
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆15Dec 22, 2021Updated 4 years ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Check which CDN providers an IP list belongs to☆194May 10, 2023Updated 2 years ago
- Collection of tools to interact with Intigriti website☆17Aug 10, 2024Updated last year
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- A fingerprint generation helper for nuclei network templates☆80Nov 20, 2022Updated 3 years ago
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Pivoting framework☆16Jun 5, 2016Updated 9 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Red Team Stuffs☆19Jul 7, 2022Updated 3 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- A curated blocklist of Autonomous System Numbers (ASNs) associated with VPN providers, datacenters, and hosting services commonly used fo…☆15Mar 11, 2026Updated last week
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 3 years ago
- Forensics artifacts collection☆21Jun 18, 2021Updated 4 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- ☆11Nov 12, 2019Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Jan 6, 2021Updated 5 years ago
- ☆14Mar 5, 2021Updated 5 years ago