A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing your own network to ensure there are no malicious services running.
☆165Nov 26, 2025Updated 3 months ago
Alternatives and similar repositories for turbo-scanner
Users that are interested in turbo-scanner are comparing it to the libraries listed below
Sorting:
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆163Nov 26, 2025Updated 3 months ago
- An open-source Python Selenium Test Automation framework with Docker and Kubernetes integration.☆32Nov 26, 2025Updated 3 months ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Nov 26, 2025Updated 3 months ago
- A micro:bit entry-level Reverse Engineering tutorial code repo which was presented at the 2021 micro:bit LIVE event.☆12Nov 27, 2025Updated 3 months ago
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Nov 26, 2025Updated 3 months ago
- DC540 hacking challenge 0x00004 [C CTF].☆11Nov 26, 2025Updated 3 months ago
- ☆19Jun 16, 2021Updated 4 years ago
- A series of small ARM 64 bite-size articles to help one better reverse AArch64 ARM 64 Linux binaries.☆21Nov 27, 2025Updated 3 months ago
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 3 months ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Nov 26, 2025Updated 3 months ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- A step-by-step walkthrough of the inner workings of a simple neural network. The goal is to demystify the calculations behind neural netw…☆29Nov 26, 2025Updated 3 months ago
- ☆11May 30, 2021Updated 4 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 8 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Sep 4, 2021Updated 4 years ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- A FREE comprehensive step-by-step 8-bit ATmega328P C and Assembler tutorial covering Embedded Software Development to Reverse Engineering…☆11Nov 26, 2025Updated 3 months ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- this tool can spy on the devices in the local network devices with many options that can make sniffing on the local network so easy to ma…☆13Apr 20, 2017Updated 8 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- ASWF Sample Project☆18Nov 19, 2024Updated last year
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- ☆33Aug 25, 2021Updated 4 years ago