A modern Nmap automation library for Python
☆18Apr 15, 2025Updated 10 months ago
Alternatives and similar repositories for nmapthon2
Users that are interested in nmapthon2 are comparing it to the libraries listed below
Sorting:
- InsecurePowerShell is PowerShell with some security features removed.☆104Dec 19, 2017Updated 8 years ago
- A comprehensive OSINT (Open Source Intelligence) script that gathers detailed information about a target domain using various public sour…☆18May 19, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Dec 11, 2025Updated 2 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- Sysmon Config Pusher - Modernized☆33Jan 7, 2026Updated last month
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆16Nov 18, 2025Updated 3 months ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 8 months ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 4 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- ☆15May 3, 2024Updated last year
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆16Aug 11, 2018Updated 7 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆31Aug 2, 2025Updated 7 months ago
- ☆30Jul 17, 2018Updated 7 years ago
- Currently supports HIPAA and NIST controls.☆17Feb 23, 2022Updated 4 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- ☆14Jun 2, 2025Updated 9 months ago
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 4 months ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago