ivre / masscan
IVRE's fork of the famous TCP port scanner. See below for details.
☆41Updated 3 weeks ago
Alternatives and similar repositories for masscan:
Users that are interested in masscan are comparing it to the libraries listed below
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Nemesis agent for Mythic☆26Updated 5 months ago
- A port of classic netcat to C#☆31Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 7 months ago
- ECC Public Key Cryptography☆36Updated last year
- wsnet☆24Updated this week
- ☆37Updated 9 months ago
- masscan with exclusive excludes☆55Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated 11 months ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 3 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 5 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 2 months ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆23Updated last year
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- ☆27Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Discord C2 Profile for Mythic☆26Updated this week
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆37Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ☆24Updated 3 years ago
- Bloodhound agent for Mythic☆16Updated 5 months ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 8 months ago
- ☆17Updated last year
- Top hashpwn rules☆17Updated 2 months ago