leesoh / npLinks
A tool to parse, deduplicate, and query multiple port scans.
☆59Updated last year
Alternatives and similar repositories for np
Users that are interested in np are comparing it to the libraries listed below
Sorting:
- FireProx written in Go☆19Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated 2 months ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- self-hosted Azure OSINT tool☆30Updated 8 months ago
- Validate proxies for specific domain☆36Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- ☆18Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- A little implant which SSH's back with a shell☆38Updated 3 years ago