Chaosmap is an information gathering tool and dns / whois / web server scanner.
☆15Jul 28, 2011Updated 14 years ago
Alternatives and similar repositories for chaosmap
Users that are interested in chaosmap are comparing it to the libraries listed below
Sorting:
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Jun 4, 2011Updated 14 years ago
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- GUI for monitoring cast-xmr☆10Apr 13, 2018Updated 7 years ago
- Repository for the Oulu University Security Engineering course.☆14Sep 12, 2025Updated 5 months ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- IJduino☆15Sep 5, 2016Updated 9 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- ☆11Jun 6, 2016Updated 9 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- black Ip lists, dorks-collection☆16Updated this week
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Jul 20, 2025Updated 7 months ago
- ☆13Nov 8, 2017Updated 8 years ago
- turn a pull-stream into a regular node stream☆17Oct 14, 2019Updated 6 years ago
- Superseded by abstract-level. A levelup package helper for distributing with an abstract-leveldown compatible back-end.☆20Dec 20, 2024Updated last year
- Independent file type identification python library☆12Mar 16, 2023Updated 2 years ago
- A tool to easily generate docker swarm stacks☆14Sep 20, 2025Updated 5 months ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago