baybed0ll / nmap-tree
Parse greppable Nmap output as a tree
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for nmap-tree
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- The Cloud Blocker☆85Updated 4 months ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- The SSH Multiplex Backdoor Tool☆62Updated 5 years ago
- A simple binary wrapper for DNS canarytokens.☆24Updated 2 years ago
- A Go client for crobat☆23Updated 4 years ago
- Serverless honeytoken 🕵🏻♂️☆79Updated last year
- first commit☆20Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆104Updated 4 years ago
- ☄️ go-out - A Golang egress buster.☆123Updated 11 months ago
- The Jolly Executioner - a simple command execution proxy☆16Updated 5 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 4 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated 8 months ago
- Linux file read monitor☆89Updated last year
- Code snippets from my blog☆25Updated 2 years ago
- Hackers Don't Give A Shit☆15Updated 4 years ago
- A Passive SSH back-end and scanner.☆102Updated 5 months ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆63Updated 2 years ago
- Universal Honey Pot☆31Updated 2 years ago
- Scans Slack for API tokens, credentials, passwords, and more using YARA rules☆38Updated 3 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆14Updated 5 years ago
- A Spicy protocol analyzer for WireGuard☆28Updated 4 years ago
- egrets monitors egress☆45Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- Slides from presentations I give!☆20Updated 6 months ago
- ☆17Updated 4 years ago