☆35Mar 19, 2022Updated 3 years ago
Alternatives and similar repositories for NetworkAttackMap
Users that are interested in NetworkAttackMap are comparing it to the libraries listed below
Sorting:
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 4 years ago
- A set of helper scripts, to be used with jlib to help parsing domains.☆27Oct 21, 2020Updated 5 years ago
- Pivoting framework☆16Jun 5, 2016Updated 9 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- MCP Parasite☆45Feb 20, 2026Updated last week
- ☆12Oct 2, 2022Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Dec 27, 2021Updated 4 years ago
- ☆15Dec 22, 2021Updated 4 years ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- Find your hash in online databases and retrieve its original value☆17Sep 22, 2023Updated 2 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 2 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Collection of tools to interact with Intigriti website☆16Aug 10, 2024Updated last year
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- ☆34Jun 23, 2021Updated 4 years ago
- Check which CDN providers an IP list belongs to☆194May 10, 2023Updated 2 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- ☆73Jan 5, 2022Updated 4 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- A fingerprint generation helper for nuclei network templates☆80Nov 20, 2022Updated 3 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Feb 2, 2025Updated last year
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago