hoodoer / Top-Port-SlicerView external linksLinks
Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma separated list you can copy into -p arg for nmap or masscan
☆18Mar 8, 2020Updated 5 years ago
Alternatives and similar repositories for Top-Port-Slicer
Users that are interested in Top-Port-Slicer are comparing it to the libraries listed below
Sorting:
- ☆10Jan 25, 2023Updated 3 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- A permutation generation tool written in golang☆206Jul 15, 2019Updated 6 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- ☆20Apr 8, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆15Sep 4, 2024Updated last year
- ☆32May 30, 2019Updated 6 years ago
- Get POTA spots, click on spots to tune radio to the frequency.☆11Apr 27, 2025Updated 9 months ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 4 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- A lab to play with authentication and authorisation problems☆98Mar 7, 2023Updated 2 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Domain availbility checker☆39Mar 7, 2021Updated 4 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Dante socks proxy + FreeRadius + DaloRadius + MySQL + phpMyAdmin☆10Aug 29, 2017Updated 8 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Examples of projects using Arduino and ESP8266☆13Oct 6, 2014Updated 11 years ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 7 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Generate IDN homographs and phishing domains☆12Aug 21, 2023Updated 2 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago