jgamblin / nmap-for-slackLinks
Custom slash command to do a basic nmap scan from within Slack
☆25Updated 9 years ago
Alternatives and similar repositories for nmap-for-slack
Users that are interested in nmap-for-slack are comparing it to the libraries listed below
Sorting:
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- ☆48Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- AYY LMAO☆12Updated 10 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 6 months ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- HTTP Header Analysis Vulnerability Tool☆115Updated 4 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 7 years ago
- ☆44Updated 8 years ago
- ☆19Updated 4 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- The NoSQL Honeypot Framework☆103Updated 2 years ago
- ☆78Updated 10 years ago
- ☆64Updated 3 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 10 years ago
- Harbinger Threat Intelligence☆83Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago