lorenzog / NetworkMap
post-exploitation network mapper
☆25Updated 8 years ago
Alternatives and similar repositories for NetworkMap:
Users that are interested in NetworkMap are comparing it to the libraries listed below
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- ☆57Updated 10 years ago
- ☆11Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Windows Privesc Check☆20Updated 10 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆63Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- A very simple Python script to take screenshots of websites☆18Updated 7 years ago
- AYY LMAO☆21Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- EmPyre Web Interface☆12Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago