VicariusInc / vicarius-nmap
nmap scripts (nse files) to identify vulnerabilities
☆31Updated last week
Alternatives and similar repositories for vicarius-nmap:
Users that are interested in vicarius-nmap are comparing it to the libraries listed below
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated this week
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 2 weeks ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Find the remote website version based on a git repository☆126Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- OWASP Foundation Web Respository☆36Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Docker container for the gophish phishing framework.☆51Updated 2 weeks ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- ☆34Updated last year
- Resources for AD penetration testing and security☆30Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 6 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated 10 months ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 3 months ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Phishing campaign docker composition for Gophish☆40Updated this week
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 4 months ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago