Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma separated list you can copy into -p arg for nmap or masscan
☆18Mar 8, 2020Updated 6 years ago
Alternatives and similar repositories for Top-Port-Slicer
Users that are interested in Top-Port-Slicer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jan 25, 2023Updated 3 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- A permutation generation tool written in golang☆210Jul 15, 2019Updated 6 years ago
- ☆20Apr 8, 2023Updated 2 years ago
- A tool to find the memory address of an environment variable in a binary☆11Jun 23, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- Simple port scanner in bash for TCP☆10Sep 23, 2024Updated last year
- ☆21Feb 21, 2025Updated last year
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 5 years ago
- ☆32May 30, 2019Updated 6 years ago
- Some of my bug bounty tools☆52Oct 23, 2019Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Domain availbility checker☆39Mar 7, 2021Updated 5 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Get POTA spots, click on spots to tune radio to the frequency.☆11Apr 27, 2025Updated 11 months ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- Examples of projects using Arduino and ESP8266☆13Oct 6, 2014Updated 11 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Windows Enumeration and Privilege Escalation Script☆18Nov 1, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Just simple log4j scanner☆12Dec 13, 2021Updated 4 years ago
- ☆20Oct 8, 2023Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Jsdir is a Burp Suite extension that extracts hidden paths from js files and beautifies it for further reading.☆122Sep 12, 2020Updated 5 years ago
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- NEO GEO MVS to SCART converter board☆20Jul 24, 2019Updated 6 years ago
- $ curl -sL sub.sh | bash☆17Aug 7, 2023Updated 2 years ago
- A Pretty simple utility built with Vue.js to check if a domain is live or down.☆19Apr 24, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 8 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- A Python3 based single-file subdomain enumerator☆90Oct 5, 2019Updated 6 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆14Jul 18, 2025Updated 8 months ago