post-exploitation network mapper
☆25Jul 6, 2016Updated 9 years ago
Alternatives and similar repositories for NetworkMap
Users that are interested in NetworkMap are comparing it to the libraries listed below
Sorting:
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- ☆16May 22, 2015Updated 10 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- SSH brute forcer tool and library, using AsyncIO of Python 3.4☆36May 27, 2020Updated 5 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Jul 6, 2019Updated 6 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Jun 21, 2016Updated 9 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Detect passive activity in the Tor-network☆13May 11, 2015Updated 10 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- ☆14Oct 29, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Host Header Injection Scanner☆50Oct 27, 2020Updated 5 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Damn Small JS Scanner☆108Feb 10, 2021Updated 5 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago