☆635Feb 17, 2026Updated last month
Alternatives and similar repositories for nmap-unleashed
Users that are interested in nmap-unleashed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Every GitHub repo mentioning OSCP — hunted, cloned, read by AI, judged by a human. 399 clean repos.☆77Mar 5, 2026Updated 3 weeks ago
- Advanced Penetration Testing Framework Professional security scanner with 6 modules: Authentication, API Security, JWT Analysis, File Up…☆47Dec 4, 2025Updated 3 months ago
- A fairly lightweight daemon that keeps your computer awake. Designed for rootless environments.☆23May 3, 2019Updated 6 years ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 7 months ago
- ☆15Jun 26, 2025Updated 9 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 4 months ago
- ☆29Jan 19, 2026Updated 2 months ago
- SHELLCTF 2021 WriteUps. A beginner-friendly CTF with an objective to get the enthusiastic students familiar with the basics, along with a…☆12Jun 7, 2021Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆398Jul 23, 2025Updated 8 months ago
- TuxCon 2025 - developing EUR 20 IoT Smart Home Server challenge☆25Aug 15, 2025Updated 7 months ago
- COPG-VD is a module designed for global device spoofing. This means even system apps and the whole device will be hooked.☆51Feb 14, 2026Updated last month
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Jan 29, 2024Updated 2 years ago
- Simple uptime monitoring (open-source)☆157Jan 11, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆24Mar 8, 2026Updated 3 weeks ago
- Tests your WAF with +160 payloads☆510Mar 19, 2026Updated last week
- A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.☆435Mar 17, 2026Updated last week
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆33Apr 15, 2025Updated 11 months ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more☆828Mar 7, 2026Updated 3 weeks ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 6 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆92Oct 5, 2025Updated 5 months ago
- WEBFANG, is my first CLI, a modular OSINT & Reconnaissance toolkit curated for Ethical Hackers and Red-Teamers. Sink fangs into web targe…☆107Mar 11, 2026Updated 2 weeks ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Gitbook: kashz-Jewels☆21Jul 1, 2025Updated 8 months ago
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Quick deployment for LEMP / LAMP on Ubuntu.☆13May 9, 2023Updated 2 years ago
- AI-powered pentesting framework with automated recon and exploitation. Multi-source subdomain discovery, active vuln testing (XSS/SQLi/SS…☆56Dec 27, 2025Updated 3 months ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- ☆17Oct 2, 2025Updated 5 months ago
- ☆192Mar 13, 2026Updated 2 weeks ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆23Aug 21, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆658Jan 16, 2026Updated 2 months ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 2 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆444Nov 3, 2025Updated 4 months ago
- A+ Grade AI Agent Security Framework - Military-grade protection against prompt injection, command injection, and Unicode bypass attacks☆99Mar 6, 2026Updated 3 weeks ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆23Jun 12, 2023Updated 2 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago