isaudits / autoenumView external linksLinks
Nmap enumeration and script scan automation script
☆38Mar 7, 2023Updated 2 years ago
Alternatives and similar repositories for autoenum
Users that are interested in autoenum are comparing it to the libraries listed below
Sorting:
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Sep 20, 2021Updated 4 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆23Jul 16, 2025Updated 6 months ago
- Helper scripts to assist penetration testing and exploit development☆35Dec 11, 2024Updated last year
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Some works on Nmap Scripts (NSE)☆89Jun 2, 2024Updated last year
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- butter is a btrfs snapshot manager.☆20Jun 4, 2018Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 6 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆138May 30, 2013Updated 12 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Web Application Security☆130Jan 6, 2026Updated last month
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Syn flood implementation with raw sockets.☆13Nov 24, 2014Updated 11 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 10 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago