Some collected notes about nmap
☆119Jul 31, 2024Updated last year
Alternatives and similar repositories for nmap_tutorial
Users that are interested in nmap_tutorial are comparing it to the libraries listed below
Sorting:
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 8 years ago
- Lists of products useful for ICS security☆108Jun 24, 2024Updated last year
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Mar 8, 2022Updated 3 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- ☆11Oct 25, 2021Updated 4 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- ☆15Sep 29, 2024Updated last year
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 4 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- Operational Technology Cyber Attack Database☆51Jul 22, 2022Updated 3 years ago
- Command Line Interface of ViPER Pen Testing tool.☆14Nov 26, 2016Updated 9 years ago
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆14Jul 18, 2025Updated 7 months ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- Create subdomains and files wordlists from your browser history☆13Jan 10, 2023Updated 3 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- SubdomainDB is a simple self-hosted API that allows you to maintain your own subdomain database.☆31Jan 8, 2018Updated 8 years ago
- Slack Bot for monitoring websites for codebase changes☆15Jun 4, 2023Updated 2 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆16Jul 7, 2022Updated 3 years ago
- ☆18Aug 13, 2020Updated 5 years ago
- Shadowsocksr client☆14Mar 15, 2022Updated 3 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Oct 12, 2021Updated 4 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- A passive subdomain finder☆334Apr 19, 2023Updated 2 years ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,924Apr 15, 2025Updated 10 months ago
- Implementation of Wappalyzer in Python☆55Dec 8, 2022Updated 3 years ago
- Basic SPI Flash command decoder for Saleae Logic 2☆25Jun 26, 2024Updated last year
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A python Flask app that generates dynamic DTDs for easy out-of-band data exfiltration.☆29Nov 2, 2022Updated 3 years ago