lorenzog / NetworkMap
post-exploitation network mapper
☆25Updated 8 years ago
Alternatives and similar repositories for NetworkMap
Users that are interested in NetworkMap are comparing it to the libraries listed below
Sorting:
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 6 years ago
- Automatically exported from code.google.com/p/surfjack - not actively maintained☆9Updated 10 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Python script to find subdomains☆11Updated 5 years ago
- ☆26Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- IPSec testing tool☆19Updated 6 months ago
- Search bing with python☆12Updated 10 years ago
- ☆25Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆63Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Tools for hunting security threats☆12Updated 5 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- SWF Vulnerability & Information Scanner☆20Updated 6 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Port Crawler Pythonized☆19Updated 2 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- Env Scraper for Linux Post Exploitation☆9Updated 7 years ago