jm33-m0 / xmirLinks
masscan result parsing, web server fingerprinting
☆19Updated 3 years ago
Alternatives and similar repositories for xmir
Users that are interested in xmir are comparing it to the libraries listed below
Sorting:
- pentest toolbox☆28Updated 3 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Updated last year
- Search Nmap and Metasploit scanning scripts.☆54Updated 8 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 6 years ago
- Port scanning and domain utility.☆30Updated 8 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Updated 4 years ago
- A tool for recover router password☆30Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆34Updated last month
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- Search bing with python☆12Updated 11 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- Python script for privilege escalation for Python☆11Updated 5 years ago
- port scanner & login credential tester☆16Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.☆16Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago