jgamblin / nmap-for-slackLinks
Custom slash command to do a basic nmap scan from within Slack
☆25Updated 9 years ago
Alternatives and similar repositories for nmap-for-slack
Users that are interested in nmap-for-slack are comparing it to the libraries listed below
Sorting:
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- ☆48Updated 9 years ago
- AYY LMAO☆22Updated 9 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆104Updated 9 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 7 years ago
- ☆19Updated 4 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- ☆44Updated 8 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 8 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- AYY LMAO☆12Updated 10 years ago