air01a / Nmap-ElasticSearchLinks
Frontend to import Nmap Scan in ES, and frontend to make search
☆10Updated 10 years ago
Alternatives and similar repositories for Nmap-ElasticSearch
Users that are interested in Nmap-ElasticSearch are comparing it to the libraries listed below
Sorting:
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- Python crawler for remote Windows shares☆12Updated 9 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 7 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- module for certexfil☆15Updated 3 years ago
- ☆11Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Simulates a logged in user.☆16Updated last year