Simple website to display the LAN status based on a nmap scan
☆58Jan 5, 2023Updated 3 years ago
Alternatives and similar repositories for lan-monitor
Users that are interested in lan-monitor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Transform NMap Scans to an D3.js HTML Table☆59Sep 21, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Jan 8, 2018Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- This is a list of Computer and Network Security Axioms☆30May 1, 2020Updated 5 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆295Aug 1, 2023Updated 2 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Nov 30, 2017Updated 8 years ago
- Materials of Workshop presented at DEFCON 25☆107Jul 29, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 7 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Powershell-based Windows Security Auditing Toolbox☆574Jan 9, 2019Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- Babel Scripting Framework☆43Oct 28, 2020Updated 5 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆358Feb 17, 2023Updated 3 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Jan 5, 2018Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- modzero DNS Masquerading Server for Windows☆46May 23, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆374Apr 27, 2023Updated 3 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Nov 29, 2017Updated 8 years ago
- Webkit uxss exploit (CVE-2017-7089)☆63Oct 3, 2017Updated 8 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆245Dec 6, 2018Updated 7 years ago