leesoh / np
A tool to parse, deduplicate, and query multiple port scans.
☆57Updated last year
Alternatives and similar repositories for np:
Users that are interested in np are comparing it to the libraries listed below
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- FireProx written in Go☆19Updated last year
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆28Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- ☆12Updated last year
- Validate proxies for specific domain☆35Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆23Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated last month
- ☆12Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago