caster0x00 / NihilistLinks
Cisco IOS Security Inspector
☆37Updated last month
Alternatives and similar repositories for Nihilist
Users that are interested in Nihilist are comparing it to the libraries listed below
Sorting:
- ☆20Updated last month
- NTP Exfiltration Tool☆146Updated 2 years ago
- 1C RAS Offensive Security Tool☆27Updated 2 years ago
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆36Updated 11 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆71Updated last month
- A web service to clean documents from potentially privacy-invasive metadata☆51Updated 6 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆54Updated 5 months ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆187Updated 3 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 7 months ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆211Updated 7 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆146Updated this week
- ☆59Updated 5 months ago
- ☆101Updated last year
- ☆56Updated 2 years ago
- GitHub CVE Repository Hunt☆19Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆101Updated 2 years ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 5 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆111Updated 2 years ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆28Updated 7 months ago
- ☆65Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆100Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆37Updated 3 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆46Updated last week
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆44Updated last year
- All in 1 phishing framework☆38Updated 3 years ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated 11 months ago
- ☆55Updated 9 months ago