Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is easy to deploy. This is a implementation for our college PCL project which is still under development and constantly updating.
☆80Jan 22, 2025Updated last year
Alternatives and similar repositories for Nmap-API
Users that are interested in Nmap-API are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- hacking framework complete source-code for web, wifi, url, sql-injection and doing a complete web scan for starters.☆30Dec 8, 2022Updated 3 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆67Jun 22, 2025Updated 11 months ago
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆594Nov 9, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last month
- ☆27Aug 18, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- contains a bruteforcer wifi hacker an batch to exe converter contains a n verity of usefull tools☆27Jan 14, 2024Updated 2 years ago
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 3 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆30Apr 3, 2025Updated last year
- hauditor is a tool designed to analyze the security headers returned by a web page.☆178Jul 6, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PassBreaker☆67Apr 5, 2024Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆69Mar 4, 2023Updated 3 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆50May 22, 2025Updated last year
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Sep 30, 2024Updated last year
- QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security…☆347Jun 25, 2024Updated last year
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆34Apr 20, 2023Updated 3 years ago
- ☆25Jan 11, 2023Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Apr 24, 2026Updated 3 weeks ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Aug 6, 2022Updated 3 years ago
- Burp Suite's extension to scan and crawl Single Page Applications☆106Apr 14, 2023Updated 3 years ago
- ☆132Jan 25, 2023Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 12 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Graphical interface for PortEx, a Portable Executable and Malware Analysis Library☆145Jun 22, 2025Updated 11 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆51Nov 8, 2022Updated 3 years ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆353Feb 21, 2026Updated 3 months ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Mar 20, 2026Updated 2 months ago
- 语雀敏感信息泄露搜索工具☆13Jan 20, 2023Updated 3 years ago
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆45Jul 13, 2023Updated 2 years ago