jgamblin / nmap-for-slackLinks
Custom slash command to do a basic nmap scan from within Slack
☆25Updated 9 years ago
Alternatives and similar repositories for nmap-for-slack
Users that are interested in nmap-for-slack are comparing it to the libraries listed below
Sorting:
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 9 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Websocket based egress tester☆20Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 8 months ago
- AYY LMAO☆22Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 10 years ago
- General scripts for random stuff☆38Updated 3 years ago
- AYY LMAO☆12Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Updated 9 years ago
- Gather and compile open source threat intelligence feeds.☆40Updated 3 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- first commit☆20Updated last year
- ☆27Updated 7 years ago
- Automatically scans for malicious proxies.☆29Updated 10 years ago
- ☆64Updated 3 years ago