m57 / piescan
A simple fast port scanner for when you cant use Nmap on a pentest.
☆68Updated 3 years ago
Alternatives and similar repositories for piescan:
Users that are interested in piescan are comparing it to the libraries listed below
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- Web recon tool (find temporary files, parse robots.txt, search some folders, google dorks and search domains hosted on same server)☆104Updated 8 years ago
- Some exploits and exploit development stuff.☆147Updated 3 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Shell-style script to search exploit-db.com exploits.☆60Updated 8 months ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆121Updated last year
- Browse and search through nmap's NSE scripts.☆59Updated 7 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Damn Small JS Scanner☆106Updated 4 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Asynchronous HTTP pipelining directory buster☆22Updated 4 years ago
- Examine HTTP response headers for common security issues☆39Updated 2 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆96Updated 2 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- Extreme Vulnerable Node Application☆96Updated 6 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆121Updated 5 years ago
- ☆121Updated 8 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 7 years ago
- Cross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.☆138Updated last year
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- SSLStrip version to defeat HSTS☆69Updated 2 years ago