leesoh / npLinks
A tool to parse, deduplicate, and query multiple port scans.
☆59Updated 2 years ago
Alternatives and similar repositories for np
Users that are interested in np are comparing it to the libraries listed below
Sorting:
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆44Updated 2 years ago
- Validate proxies for specific domain☆36Updated 4 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆26Updated 3 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- FireProx written in Go☆21Updated last year
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Ffuf output browser☆39Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- ☆12Updated 3 years ago
- visually see issues with supported cipher suites☆16Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- ☆54Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- ⚡ Golang library for quick make pentest tools☆17Updated 4 months ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- A script used to query the dehashed API and filter for more useful results☆17Updated 4 years ago