The modular distributed fingerprinting engine
☆219Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for scannerl
Users that are interested in scannerl are comparing it to the libraries listed below
Sorting:
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆167Feb 20, 2018Updated 8 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Summary and archives of leaked Russian TLD DNS data☆188Jun 20, 2017Updated 8 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Nov 25, 2021Updated 4 years ago
- Powershell-based Windows Security Auditing Toolbox☆573Jan 9, 2019Updated 7 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Generic Zipper implementation in Erlang☆37Nov 26, 2025Updated 3 months ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- XFLTReaT tunnelling framework☆329Jan 16, 2020Updated 6 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Oct 28, 2023Updated 2 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- Paskto - Passive Web Scanner☆150Dec 28, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- An SQL interface for AntidoteDB☆13Mar 18, 2018Updated 7 years ago
- RSASSA-PSS Public Key Cryptographic Signature Algorithm for Erlang and Elixir.☆12Jul 28, 2019Updated 6 years ago
- Erlang and Elixir supervisors restart strategies☆11Aug 3, 2017Updated 8 years ago
- a grep -r for secrets☆179May 4, 2022Updated 3 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Cutting the Gordian knot of blocking calls between OTP processes☆18Oct 14, 2018Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Nov 21, 2018Updated 7 years ago