A Nmap XSL implementation with Bootstrap.
☆969Nov 13, 2023Updated 2 years ago
Alternatives and similar repositories for nmap-bootstrap-xsl
Users that are interested in nmap-bootstrap-xsl are comparing it to the libraries listed below
Sorting:
- Converts/manipulates/extracts data from a Nmap scan output.☆549Apr 29, 2024Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,187Dec 11, 2022Updated 3 years ago
- This tool can be used to brute discover GET and POST parameters☆1,395Aug 24, 2019Updated 6 years ago
- A Tool for Domain Flyovers☆5,912May 22, 2022Updated 3 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,363Sep 30, 2024Updated last year
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,284Aug 18, 2025Updated 7 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,458Oct 1, 2025Updated 5 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,660Jan 5, 2026Updated 2 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,477Jan 9, 2025Updated last year
- NSE script based on Vulners.com API☆3,368Sep 26, 2025Updated 5 months ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,662Nov 28, 2020Updated 5 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,787Apr 26, 2024Updated last year
- Active Directory information dumper via LDAP☆1,385Apr 6, 2025Updated 11 months ago
- ☆2,319Dec 8, 2023Updated 2 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,649Oct 11, 2018Updated 7 years ago
- Monitor linux processes without root permissions☆5,927Mar 1, 2026Updated 2 weeks ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,995Oct 10, 2018Updated 7 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,902Jan 24, 2024Updated 2 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- A swiss army knife for pentesting networks☆9,100Dec 6, 2023Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆4,300Apr 13, 2024Updated last year
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆3,022Dec 11, 2025Updated 3 months ago
- Active Directory Assessment and Privilege Escalation Script☆1,127Dec 7, 2022Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,329Dec 6, 2023Updated 2 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,600Oct 4, 2024Updated last year
- Trying to tame the three-headed dog.☆4,920Nov 14, 2025Updated 4 months ago
- SimplE RePort wrIting and COllaboration tool☆1,111May 3, 2020Updated 5 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,622Jan 23, 2024Updated 2 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,867May 20, 2025Updated 10 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,821Nov 19, 2024Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,801Jul 29, 2025Updated 7 months ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,483Oct 12, 2024Updated last year
- In-depth attack surface mapping and asset discovery☆14,256Mar 13, 2026Updated last week
- Burp Suite Extension to monitor new scope☆200Mar 31, 2021Updated 4 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 3 months ago
- HTTP parameter discovery suite.☆6,142Feb 20, 2025Updated last year
- DNS Takeover tool written in Go☆2,033Updated this week