Nmap Dashboard Mini Project
☆632Jun 12, 2024Updated last year
Alternatives and similar repositories for nmap-did-what
Users that are interested in nmap-did-what are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analyze pcaps with Zeek and a Grafana Dashboard☆191May 24, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆728Apr 2, 2026Updated 2 weeks ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- ☆166Feb 29, 2024Updated 2 years ago
- The OWASP OFFAT tool autonomously assesses your API for prevalent vulnerabilities, though full compatibility with OAS v3 is pending. The …☆660Apr 6, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆152May 3, 2024Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Dec 5, 2023Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,174Nov 28, 2025Updated 4 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- game of active directory☆7,691Mar 12, 2026Updated last month
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,514Mar 18, 2026Updated 3 weeks ago
- Pen Test Report Generation and Assessment Collaboration☆594Updated this week
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated 3 weeks ago
- how to look for Leaked Credentials !☆1,039May 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,027Feb 1, 2026Updated 2 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated last month
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,944Mar 26, 2026Updated 3 weeks ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- Active Directory Auditing and Enumeration☆523Mar 31, 2026Updated 2 weeks ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆516Aug 7, 2024Updated last year
- Pentesting automation platform that combines hacking tools to complete assessments☆525Updated this week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆374Mar 24, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,849Nov 3, 2024Updated last year
- Pentest Report Generator☆2,794Updated this week
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆442Jul 8, 2024Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated last year
- Tools and Techniques for Red Team / Penetration Testing☆8,641Mar 18, 2025Updated last year
- WiFi Penetration Testing & Auditing Tool☆770Apr 28, 2025Updated 11 months ago
- Windows Local Privilege Escalation Cookbook☆1,300Feb 5, 2026Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The Network Execution Tool☆5,407Apr 6, 2026Updated last week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,448Feb 15, 2026Updated 2 months ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆387Apr 26, 2025Updated 11 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,347Nov 12, 2025Updated 5 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆323Mar 27, 2025Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,221Jan 5, 2026Updated 3 months ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 2 months ago