heywoodlh / port-crawler-py
Port Crawler Pythonized
☆18Updated 2 years ago
Alternatives and similar repositories for port-crawler-py:
Users that are interested in port-crawler-py are comparing it to the libraries listed below
- ☆34Updated 2 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 11 months ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 3 years ago
- ☆22Updated 4 years ago
- Shodan Port Scanner☆42Updated 4 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆22Updated 7 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Scripts related to offensiveosint.io☆21Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago