A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assign one on startup.
☆12Sep 4, 2019Updated 6 years ago
Alternatives and similar repositories for arp-scanner
Users that are interested in arp-scanner are comparing it to the libraries listed below
Sorting:
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆66Aug 24, 2019Updated 6 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- ☆39Mar 25, 2021Updated 4 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆71Jan 21, 2019Updated 7 years ago
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆33Oct 24, 2023Updated 2 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Jun 10, 2018Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Free e-books, built from markdown☆11Jul 15, 2024Updated last year
- These scripts are made for Raycast. They help me achieve maximum productivity when using my Mac.☆11Jul 24, 2023Updated 2 years ago
- Generate letters (plain text or PDF) from templates.☆14Jan 8, 2023Updated 3 years ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆23Updated this week
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- Examine HTTP response headers for common security issues☆38Jun 7, 2022Updated 3 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Jan 4, 2018Updated 8 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Historical context for current weather in 78 cities in Europe.☆10Dec 19, 2019Updated 6 years ago
- Go SDK of Malicious Wallet Address Database☆11Apr 9, 2018Updated 7 years ago