jgamblin / nmap-for-slackLinks
Custom slash command to do a basic nmap scan from within Slack
☆25Updated 9 years ago
Alternatives and similar repositories for nmap-for-slack
Users that are interested in nmap-for-slack are comparing it to the libraries listed below
Sorting:
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- ☆48Updated 9 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- AYY LMAO☆12Updated 10 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- ☆64Updated 3 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 8 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 7 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 10 years ago
- A Network Inspection Tool☆82Updated 7 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- AYY LMAO☆22Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115Updated 9 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆25Updated 4 months ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- YAPDNS☆39Updated 10 years ago
- Passive DNS visualization and Passive DNS server toolkit☆35Updated 13 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago
- ☆18Updated 10 years ago
- ☆44Updated 8 years ago