m8sec / ipparser
Python support package to parse IP and host inputs from network based tooling
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ipparser
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Burp Suite extension for extracting metadata from files☆19Updated 3 years ago
- parsers to make life easier☆12Updated 4 years ago
- ⚡ Golang library for quick make pentest tools☆15Updated last year
- Burp Suite Pro extension☆10Updated 7 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- List of domains having RVDP programmes☆10Updated 4 years ago
- ☆12Updated 3 years ago
- ☆17Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Static analysis of APKs with regular expressions☆10Updated 3 years ago