jm33-m0 / xmirLinks
masscan result parsing, web server fingerprinting
☆17Updated 3 years ago
Alternatives and similar repositories for xmir
Users that are interested in xmir are comparing it to the libraries listed below
Sorting:
- pentest toolbox☆27Updated 3 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Updated 2 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Updated 6 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Python emulator of msfconsole☆11Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- A reverse socks5 proxy server and client☆18Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 8 years ago
- Minimalistic DNS logging tool☆43Updated 4 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Updated 4 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- Simple golang reverse shell☆20Updated 6 years ago
- Ansible scripts to build an attack box☆24Updated 7 years ago
- Python script for privilege escalation for Python☆11Updated 5 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- The best way to send emails in Go.☆12Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Updated 4 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- Very loud vBulletin exploit☆14Updated 5 years ago
- Tools for hunting security threats☆12Updated 5 years ago