jmbr / halberd
Load balancer detection tool. Moved to https://git.sr.ht/~jmbr/halberd
☆85Updated 7 years ago
Alternatives and similar repositories for halberd:
Users that are interested in halberd are comparing it to the libraries listed below
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 4 years ago
- Advanced web server fingerprinting for Nmap☆125Updated 7 years ago
- ☆53Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- Additional modules for recon-ng☆104Updated 7 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated last year
- Tool for breaking into web applications.☆90Updated 5 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- Internet data acquisition☆149Updated 4 years ago
- ☆51Updated 8 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 8 years ago
- Nmap enumeration and script scan automation script☆38Updated last year
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆68Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆122Updated 5 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- SpiderLabs shared Nmap Tools☆228Updated 4 years ago
- Automated digital reconnaissance☆194Updated 2 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆95Updated 2 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- ☆92Updated 6 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆118Updated 4 years ago