Network Finger Printer
☆16Nov 10, 2017Updated 8 years ago
Alternatives and similar repositories for nfp
Users that are interested in nfp are comparing it to the libraries listed below
Sorting:
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- A Go parser for the /etc/passwd file☆21Feb 14, 2024Updated 2 years ago
- A web based drag and drop file transfer tool for sending files across the internet.☆22Apr 19, 2023Updated 2 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 4 months ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆85Jan 12, 2026Updated last month
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- An AWS Lambda Port Scanner and SSL expiry checker☆12Dec 4, 2016Updated 9 years ago
- Implements io.ReaderAt over raw memory.☆13Jun 26, 2020Updated 5 years ago
- Encryption Abstraction Layer and Utilities for ratnet☆18May 3, 2024Updated last year
- ☆67Dec 19, 2018Updated 7 years ago
- A pattern for a self-installing Windows service in C# with the unstoppable attributes in C#.☆67Jan 19, 2019Updated 7 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Oct 28, 2023Updated 2 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 4 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- macOS Client-Side Phishing lock screen payload☆129Apr 14, 2019Updated 6 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- Hostname filtering for arbitrary network protocols☆23Feb 13, 2026Updated 2 weeks ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- ☆64Jan 17, 2026Updated last month
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago