A modern Nmap automation library for Python
☆18Apr 15, 2025Updated 11 months ago
Alternatives and similar repositories for nmapthon2
Users that are interested in nmapthon2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- ☆15Jan 15, 2026Updated 2 months ago
- InsecurePowerShell is PowerShell with some security features removed.☆104Dec 19, 2017Updated 8 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- A Nagios-compatible monitoring agent☆14Mar 13, 2026Updated last week
- ☆14Jun 2, 2025Updated 9 months ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 2 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- Thanatos.☆16Apr 29, 2021Updated 4 years ago
- Windows eventlog formatting, live fetching and querying utility in C☆20May 26, 2020Updated 5 years ago
- Certified Kubernetes Administrators Certification☆15Feb 12, 2026Updated last month
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Apr 19, 2023Updated 2 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- A dns proxy for ssh over dns☆27May 1, 2021Updated 4 years ago
- Running mirai botnet in lab environment☆10Apr 9, 2017Updated 8 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Hardened Windows Server image☆19Sep 19, 2019Updated 6 years ago
- Convert gpsxml files to png files which can be opened in Qgis☆13Aug 16, 2016Updated 9 years ago
- Introduction to Terraform and Ansible☆14Jul 17, 2023Updated 2 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- Automated daily scan using Nmap and report on the differences☆21Mar 12, 2018Updated 8 years ago
- Role Ansible Openscap☆17Oct 16, 2024Updated last year
- Effectively search the Exploit-DB☆15Apr 16, 2020Updated 5 years ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Jun 29, 2025Updated 8 months ago
- Ansible role to detect Log4Shell exploitation attempts☆18Dec 22, 2021Updated 4 years ago
- ☆13Jun 27, 2023Updated 2 years ago
- Load C# Code straight to memory☆56May 14, 2020Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- Panoptes Endpoint Detection and Response Solution☆43Mar 7, 2026Updated 2 weeks ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- DHCP attack tool☆21Oct 4, 2024Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago