Clustering NMAP XML results to help make sense of large scan results.
☆33Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for NMAP-Cluster
Users that are interested in NMAP-Cluster are comparing it to the libraries listed below
Sorting:
- Use Markov Chains to obfuscate data as other data☆54Aug 3, 2016Updated 9 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Nov 27, 2016Updated 9 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- Spam Honeypot Tool☆27Jun 1, 2016Updated 9 years ago
- ☆18Apr 16, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 9 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆66Mar 6, 2013Updated 12 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆29Feb 21, 2022Updated 4 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆114May 27, 2017Updated 8 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆205Aug 29, 2016Updated 9 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆27Apr 24, 2019Updated 6 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Simple host-based permit-by-exception iptables generation script☆16Sep 5, 2020Updated 5 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- Simple reverse ICMP shell☆41May 17, 2013Updated 12 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!☆231Dec 11, 2020Updated 5 years ago
- A simple application to calculate similarity between two files (text document) using Smith-Waterman algorithm that is used originally to …☆10Apr 15, 2017Updated 8 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- MOVED TO☆10Oct 29, 2018Updated 7 years ago