infobyte / faraday-cli
Faraday's Command Line Interface
☆42Updated 6 months ago
Related projects: ⓘ
- Security tools report parsers for Faradaysec.com☆48Updated last week
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆71Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆64Updated 2 years ago
- Enumerate AWS permissions and resources.☆62Updated 2 years ago
- Various XSL templates to manipulate data from NMap XML reports☆25Updated 5 years ago
- ☆25Updated this week
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆37Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆38Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆56Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆26Updated last year
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Merge multiple nMap xml files into one☆47Updated 5 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 5 years ago
- Cervantes plataform docker repository☆12Updated 7 months ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆41Updated last year
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆22Updated 4 years ago
- Burp Commander written in Go☆57Updated 5 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆23Updated 3 years ago
- ☆90Updated this week
- Collaborative pentest tool with highly customizable tools☆71Updated 2 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆33Updated last month
- Inspired by gowitness and EyeWitness☆14Updated 3 weeks ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆56Updated 5 years ago
- ☆31Updated this week
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated last year
- Kubernetes Scanner☆41Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 3 years ago
- ☆58Updated last year