Clustering NMAP XML results to help make sense of large scan results.
☆33Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for NMAP-Cluster
Users that are interested in NMAP-Cluster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use Markov Chains to obfuscate data as other data☆54Aug 3, 2016Updated 9 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Nov 27, 2016Updated 9 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".☆13Nov 5, 2020Updated 5 years ago
- scripts and examples for using JTAG debug tools to gain root access☆27Aug 15, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Short demo about how to manage TOR network agent with Python (stem)☆10Feb 20, 2019Updated 7 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- ☆18Apr 16, 2015Updated 10 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Azure Sentinel Template parser☆16Nov 2, 2020Updated 5 years ago
- Simple host-based permit-by-exception iptables generation script☆16Sep 5, 2020Updated 5 years ago
- ☆11Mar 26, 2018Updated 7 years ago
- Spam Honeypot Tool☆27Jun 1, 2016Updated 9 years ago
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇☆16Mar 17, 2022Updated 4 years ago
- Tool for rebasing a PCAP file and editing layer2 and layer 3 addresses☆16Dec 30, 2020Updated 5 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Scraping workshop☆16Nov 21, 2016Updated 9 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- NMap XML decoding for logstash☆28Nov 16, 2022Updated 3 years ago
- ☆305May 28, 2017Updated 8 years ago
- Ejercicios del libro☆16Apr 7, 2015Updated 10 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- ☆27Jul 29, 2024Updated last year
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 9 years ago