A modern Nmap automation library for Python
☆17Apr 15, 2025Updated last year
Alternatives and similar repositories for nmapthon2
Users that are interested in nmapthon2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kernel spec, config for vanilla kernel rpms from kernel.org☆10Jan 24, 2022Updated 4 years ago
- Red Hat Enterprise Linux 7 Security Technical Implementation Guide in Sphinx☆11Dec 15, 2023Updated 2 years ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 8 years ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11May 11, 2024Updated 2 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 11 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- ☆15Apr 4, 2026Updated last month
- InsecurePowerShell is PowerShell with some security features removed.☆105Dec 19, 2017Updated 8 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Mar 24, 2026Updated last month
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- A Nagios-compatible monitoring agent☆14May 13, 2026Updated last week
- An ARM64 Linux ELF Packer/Loader☆37May 15, 2026Updated last week
- ☆22Mar 14, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆14Jun 2, 2025Updated 11 months ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆16Aug 11, 2018Updated 7 years ago
- Retos Una Al Mes Hispasec☆17Mar 25, 2024Updated 2 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Kernel module to hide tcp connections from an attacker ip address☆12Mar 24, 2022Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Thanatos.☆16Apr 29, 2021Updated 5 years ago
- Windows eventlog formatting, live fetching and querying utility in C☆20May 26, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Certified Kubernetes Administrators Certification☆15Feb 12, 2026Updated 3 months ago
- How to setup Wireless EAP-TLS and EAP-PEAP with RouterOS V6 only or with RouterOS V7 and User Manager V5 - including CRL and ready for WP…☆24Aug 17, 2023Updated 2 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Mar 19, 2026Updated 2 months ago
- ☆20Apr 21, 2020Updated 6 years ago
- A dns proxy for ssh over dns☆27May 1, 2021Updated 5 years ago
- python wrapper to use tshark for file extraction from the command line.☆26Nov 15, 2018Updated 7 years ago
- Running mirai botnet in lab environment☆10Apr 9, 2017Updated 9 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Convert gpsxml files to png files which can be opened in Qgis☆13Aug 16, 2016Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Role Ansible Openscap☆17Oct 16, 2024Updated last year
- A tool for Oragnized ASM (Attack Surface Mapper). Subdomains enumeration, IPs scans, Vulnerability assesment...☆38Sep 11, 2023Updated 2 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Dec 22, 2021Updated 4 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆30May 8, 2026Updated 2 weeks ago
- ☆13Jun 27, 2023Updated 2 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Load C# Code straight to memory☆56May 14, 2020Updated 6 years ago