leesoh / npLinks
A tool to parse, deduplicate, and query multiple port scans.
☆59Updated 2 years ago
Alternatives and similar repositories for np
Users that are interested in np are comparing it to the libraries listed below
Sorting:
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- FireProx written in Go☆21Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆48Updated 2 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Validate proxies for specific domain☆37Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Ffuf output browser☆39Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- A script used to query the dehashed API and filter for more useful results☆17Updated 4 years ago
- ☆26Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆12Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Ansible role that Installs Mythic☆18Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆17Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Finding SSL Blindspots for Red Teams☆33Updated 5 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago