A simple fast port scanner for when you cant use Nmap on a pentest.
☆69Jun 29, 2021Updated 4 years ago
Alternatives and similar repositories for piescan
Users that are interested in piescan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatic VLAN configuration tool for Linux☆25Jan 24, 2019Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 4 years ago
- CVE-2018-1111 DynoRoot☆12May 21, 2018Updated 7 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Our CTF to celebrate our hackers approaching $50M in bounty earnings!☆15Mar 25, 2023Updated 3 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 2 months ago
- Very hard chess testset☆15Oct 22, 2016Updated 9 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,731Feb 3, 2022Updated 4 years ago
- Scripts to analyze audio CD data quality☆24Apr 24, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆23Jan 4, 2017Updated 9 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Jun 13, 2021Updated 4 years ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- Hack It Framework☆28Jul 14, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 9 years ago
- Anonymous FTP Scanner Script- Generates IP's between two ranges, scans 21 and attempts a anonymous connection☆10Nov 23, 2014Updated 11 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 10 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- ☆11Apr 28, 2017Updated 9 years ago
- Secure approach to secure file storage in untrusted environments.☆35Mar 26, 2019Updated 7 years ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 7 months ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- This cookbook installs Nexpose☆13Dec 15, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple C# reverse shell with shellcode and process injection☆40May 13, 2016Updated 9 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 7 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆49May 1, 2022Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 8 years ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago