Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automation pipeline.
☆43Jun 15, 2025Updated 8 months ago
Alternatives and similar repositories for nmapurls
Users that are interested in nmapurls are comparing it to the libraries listed below
Sorting:
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- CVE-2023-7028☆58Jan 12, 2024Updated 2 years ago
- ☆75Apr 8, 2024Updated last year
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆96Aug 9, 2024Updated last year
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- A simple C# program to unhook AMSI and execute unmanaged PowerShell.☆19Sep 2, 2021Updated 4 years ago
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 3 months ago
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Apr 10, 2024Updated last year
- an Evil Java RMI Registry.☆51Feb 8, 2023Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- A python Flask app that generates dynamic DTDs for easy out-of-band data exfiltration.☆29Nov 2, 2022Updated 3 years ago
- Golang Gremlin Tinkerpop client with Azure CosmosDB compatibility☆11Oct 25, 2024Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- Project documentation about the development, releasing, and maintenance of the Ubuntu Linux distribution.☆22Updated this week
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆79Feb 25, 2026Updated last week
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆88Jun 23, 2025Updated 8 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆226Oct 11, 2025Updated 4 months ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- Republic of Korea (South Korea) specific OSINT source list☆16Mar 2, 2022Updated 4 years ago
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆33Nov 12, 2025Updated 3 months ago