caffix / netmap
Graphing package for mapping and visualizing the Internet
☆18Updated last year
Alternatives and similar repositories for netmap
Users that are interested in netmap are comparing it to the libraries listed below
Sorting:
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 11 months ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆12Updated 6 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆12Updated last year
- Swiftly search FDNS datasets from Rapid7 Open Data☆22Updated 2 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- React UI☆11Updated 2 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts☆26Updated 5 years ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆12Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Modular C2 server to tame your pack of wolves☆12Updated 2 weeks ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Self defense post module for metasploit☆17Updated 5 years ago