Nmap Dashboard Mini Project
☆629Jun 12, 2024Updated last year
Alternatives and similar repositories for nmap-did-what
Users that are interested in nmap-did-what are comparing it to the libraries listed below
Sorting:
- Analyze pcaps with Zeek and a Grafana Dashboard☆189May 24, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆725Feb 14, 2026Updated 2 weeks ago
- ☆168Feb 29, 2024Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- The OWASP OFFAT tool autonomously assesses your API for prevalent vulnerabilities, though full compatibility with OAS v3 is pending. The …☆660Sep 19, 2025Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Pen Test Report Generation and Assessment Collaboration☆590Feb 22, 2026Updated last week
- Dominate Active Directory with PowerShell.☆1,164Nov 28, 2025Updated 3 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,205Dec 29, 2025Updated 2 months ago
- Active Directory Auditing and Enumeration☆517Dec 3, 2025Updated 2 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- game of active directory☆7,484Jul 16, 2025Updated 7 months ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,475Jan 23, 2026Updated last month
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,927Jan 20, 2026Updated last month
- how to look for Leaked Credentials !☆1,033May 6, 2024Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,013Feb 1, 2026Updated last month
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆514Aug 7, 2024Updated last year
- WiFi Penetration Testing & Auditing Tool☆719Apr 28, 2025Updated 10 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆701May 7, 2025Updated 9 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,821Nov 3, 2024Updated last year
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Dec 29, 2024Updated last year
- Windows Local Privilege Escalation Cookbook☆1,277Feb 5, 2026Updated 3 weeks ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆520Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆814Mar 28, 2025Updated 11 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- The Network Execution Tool☆5,279Feb 23, 2026Updated last week
- Red Team Attack Lab for TTP testing & research☆595May 15, 2023Updated 2 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Apr 22, 2024Updated last year
- Pentest Report Generator☆2,758Updated this week
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,823Aug 20, 2025Updated 6 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,055Dec 11, 2024Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆443Jul 8, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,161Mar 28, 2025Updated 11 months ago
- ☆75Apr 8, 2024Updated last year
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆384Apr 26, 2025Updated 10 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,182Jan 5, 2026Updated last month