Zeyad-Azima / Need-IP
A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Need-IP
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Spider or repeater to find all links.☆13Updated 3 years ago
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- A Fast & free Windows remote administration tool.☆10Updated 2 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆13Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- ☆12Updated 3 years ago
- Brute Force and Scan WinRm Service☆13Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Standardizing Security Titles☆13Updated last year
- Central IoC scanner based on Loki☆20Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago