f-froehlich / nmap-scan
Nmap wrapper for python with full Nmap DTD support, parallel scans and threaded callback methods support for faster analytics.
☆11Updated last year
Alternatives and similar repositories for nmap-scan:
Users that are interested in nmap-scan are comparing it to the libraries listed below
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- Changes the output of Wappalyzer into something human readable. It also provides links to useful websites and a Google query for finding…☆9Updated 2 years ago
- ☆17Updated last year
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 7 years ago
- GUI manager for network tunnels developed for Command and Control systems.☆11Updated 2 years ago
- My security advisories☆11Updated this week
- A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.☆28Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 2 years ago
- Red Team Templates For Obsidian.md☆28Updated 3 years ago
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 4 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Create an AMI with CobaltStrike and related tools.☆10Updated 2 weeks ago
- Offensive security use cases of ChatGPT☆76Updated 2 years ago
- Clear All Windows System Logs - AntiForensics☆53Updated 9 years ago
- ☆20Updated 3 years ago
- Discord as a C2☆49Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Secure open-source password manager.☆12Updated 3 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆99Updated last year
- A Burp Suite extension which performs checks for cross-domain scripting against the DOM, subresource integrity checks, and evaluates Java…☆9Updated 3 years ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- Extract passwords from memory with strace☆38Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆40Updated 7 months ago
- Some tools based on docker☆24Updated 4 years ago
- using rapid7 open dns data search subdomain and reverse ip☆9Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- ☆26Updated 2 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- netcat-like CLI tool with advanced features for bind/reverse shells☆16Updated 3 weeks ago