post-exploitation network mapper
☆25Jul 6, 2016Updated 9 years ago
Alternatives and similar repositories for NetworkMap
Users that are interested in NetworkMap are comparing it to the libraries listed below
Sorting:
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 10 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Detect passive activity in the Tor-network☆13May 11, 2015Updated 10 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- ☆16May 22, 2015Updated 10 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 7 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- ida插件☆31Feb 29, 2016Updated 10 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆18Jul 13, 2020Updated 5 years ago
- A very simple Python script to take screenshots of websites☆18Aug 29, 2017Updated 8 years ago
- Docker image for rbanffy/vm370☆26Dec 30, 2025Updated last month
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Reconstruct javascript from a sourcemap in bash☆38Nov 23, 2021Updated 4 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Host Header Injection Scanner☆50Oct 27, 2020Updated 5 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Dec 30, 2013Updated 12 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆45Sep 29, 2014Updated 11 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Jul 6, 2019Updated 6 years ago
- Google dorks generator to find open shells (on government sites)☆28Jul 9, 2014Updated 11 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago