Shodan HQ nmap plugin - passively scan targets
☆157Mar 14, 2016Updated 10 years ago
Alternatives and similar repositories for shodan-hq-nse
Users that are interested in shodan-hq-nse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Some works on Nmap Scripts (NSE)☆89Jun 2, 2024Updated last year
- Nmap NSE scripts☆28Feb 1, 2022Updated 4 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Maltego Transforms, Machines and other extentions☆45Jul 17, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 8 years ago
- Examples from The Hitchhiker's Guide To Cross-Site Scripting (XSS)☆44Jul 7, 2012Updated 13 years ago
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆574Dec 9, 2017Updated 8 years ago
- ☆197Sep 27, 2018Updated 7 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆141Aug 31, 2021Updated 4 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- DefCon24☆121Sep 2, 2016Updated 9 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆687Oct 27, 2016Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Oct 22, 2016Updated 9 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago