A Nmap XSL implementation with Bootstrap.
☆962Nov 13, 2023Updated 2 years ago
Alternatives and similar repositories for nmap-bootstrap-xsl
Users that are interested in nmap-bootstrap-xsl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Converts/manipulates/extracts data from a Nmap scan output.☆551Apr 29, 2024Updated 2 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,191Dec 11, 2022Updated 3 years ago
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- A Tool for Domain Flyovers☆5,937May 22, 2022Updated 4 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,377Sep 30, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,293Aug 18, 2025Updated 9 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,480Oct 1, 2025Updated 7 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,731Jan 5, 2026Updated 4 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,495Jan 9, 2025Updated last year
- NSE script based on Vulners.com API☆3,378Sep 26, 2025Updated 7 months ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,672Nov 28, 2020Updated 5 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,802Apr 26, 2024Updated 2 years ago
- ☆2,326Dec 8, 2023Updated 2 years ago
- Active Directory information dumper via LDAP☆1,404Apr 6, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,664Oct 11, 2018Updated 7 years ago
- Monitor linux processes without root permissions☆6,018Mar 1, 2026Updated 2 months ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆2,005Oct 10, 2018Updated 7 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,912Jan 24, 2024Updated 2 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 6 years ago
- A swiss army knife for pentesting networks☆9,131Dec 6, 2023Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆4,350Apr 13, 2024Updated 2 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆3,077Apr 25, 2026Updated 3 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,341Dec 6, 2023Updated 2 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,604Oct 4, 2024Updated last year
- Trying to tame the three-headed dog.☆5,007Nov 14, 2025Updated 6 months ago
- SimplE RePort wrIting and COllaboration tool☆1,112May 3, 2020Updated 6 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,617Jan 23, 2024Updated 2 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,882May 20, 2025Updated last year
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,832Nov 19, 2024Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,823Jul 29, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SSRF (Server Side Request Forgery) testing resources☆2,494Oct 12, 2024Updated last year
- Burp Suite Extension to monitor new scope☆200Mar 31, 2021Updated 5 years ago
- In-depth attack surface mapping and asset discovery☆14,563Apr 17, 2026Updated last month
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆660Feb 1, 2025Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,638Apr 28, 2026Updated 3 weeks ago
- DNS Takeover tool written in Go☆2,065Mar 16, 2026Updated 2 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,663Aug 28, 2025Updated 8 months ago