Shodan HQ nmap plugin - passively scan targets
☆157Mar 14, 2016Updated 10 years ago
Alternatives and similar repositories for shodan-hq-nse
Users that are interested in shodan-hq-nse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Some works on Nmap Scripts (NSE)☆89Jun 2, 2024Updated last year
- Nmap NSE scripts☆28Feb 1, 2022Updated 4 years ago
- Security tools to use on assessments.☆41May 9, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Maltego Transforms, Machines and other extentions☆45Jul 17, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 8 years ago
- Examples from The Hitchhiker's Guide To Cross-Site Scripting (XSS)☆44Jul 7, 2012Updated 13 years ago
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Data exfiltration PoC scripts☆24Sep 11, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Automates some pentest jobs via nmap xml file☆324Sep 7, 2018Updated 7 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆575Dec 9, 2017Updated 8 years ago
- ☆197Sep 27, 2018Updated 7 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆141Aug 31, 2021Updated 4 years ago
- ☆138Jul 13, 2017Updated 8 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- One-off scripts☆53Sep 4, 2017Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- DefCon24☆121Sep 2, 2016Updated 9 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆684Oct 27, 2016Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆310Oct 22, 2016Updated 9 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago