jgamblin / nmap-for-slack
Custom slash command to do a basic nmap scan from within Slack
☆25Updated 8 years ago
Alternatives and similar repositories for nmap-for-slack:
Users that are interested in nmap-for-slack are comparing it to the libraries listed below
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 8 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- Websocket based egress tester☆20Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Web Interface Portal & Security Threat Engine for REMnux☆24Updated 8 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- AYY LMAO☆21Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- ☆27Updated 7 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆33Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago