jmbr / halberdLinks
Load balancer detection tool. Moved to https://git.sr.ht/~jmbr/halberd
☆89Updated 8 years ago
Alternatives and similar repositories for halberd
Users that are interested in halberd are comparing it to the libraries listed below
Sorting:
- Shodan HQ nmap plugin - passively scan targets☆155Updated 9 years ago
- ☆75Updated 11 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆70Updated 9 years ago
- ☆54Updated 9 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 10 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆120Updated 5 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆105Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆107Updated 11 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- ☆63Updated 13 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Fast http dead file finder.☆217Updated 5 months ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Common Findings Database☆102Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Mass scanner for the Java serialize bug☆152Updated 6 months ago
- Browse and search through nmap's NSE scripts.☆58Updated 8 years ago
- Additional modules for recon-ng☆106Updated 7 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- VOIP Security Audit Framework☆109Updated 7 years ago
- ☆90Updated 3 months ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆168Updated 8 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 7 years ago
- Search exploits in multiple exploit databases!☆86Updated 5 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆86Updated 11 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago