lorenzog / NetworkMapLinks
post-exploitation network mapper
☆25Updated 8 years ago
Alternatives and similar repositories for NetworkMap
Users that are interested in NetworkMap are comparing it to the libraries listed below
Sorting:
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- A very simple Python script to take screenshots of websites☆18Updated 7 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- ☆57Updated 10 years ago
- Env Scraper for Linux Post Exploitation☆9Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 6 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- ☆11Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Search bing with python☆12Updated 10 years ago
- Automatically exported from code.google.com/p/surfjack - not actively maintained☆9Updated 10 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- DNS logging, detection, ...☆15Updated 3 years ago