A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing your own network to ensure there are no malicious services running.
☆167Nov 26, 2025Updated 5 months ago
Alternatives and similar repositories for turbo-scanner
Users that are interested in turbo-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆166Nov 26, 2025Updated 5 months ago
- An open-source Python Selenium Test Automation framework with Docker and Kubernetes integration.☆32Nov 26, 2025Updated 5 months ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆17Nov 26, 2025Updated 5 months ago
- A micro:bit entry-level Reverse Engineering tutorial code repo which was presented at the 2021 micro:bit LIVE event.☆12Nov 27, 2025Updated 5 months ago
- DC540 hacking challenge 0x00004 [C CTF].☆11Nov 26, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Nov 26, 2025Updated 5 months ago
- A series of small ARM 64 bite-size articles to help one better reverse AArch64 ARM 64 Linux binaries.☆21Nov 27, 2025Updated 5 months ago
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 5 months ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Nov 26, 2025Updated 5 months ago
- ☆18Jun 16, 2021Updated 4 years ago
- ☆11May 30, 2021Updated 4 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Bypass TPM and SecureBoot Check in Windows 11 Installation.☆13Mar 9, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- Phone to Desktop opensource project☆20Aug 7, 2017Updated 8 years ago
- DeadManSwitch in rust with several triggers (remote local and network)☆17Nov 19, 2025Updated 5 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Aug 18, 2023Updated 2 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆13Jul 30, 2021Updated 4 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 5 months ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- ☆14Mar 26, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 4 years ago
- Deepfake Detector is an AI/ML model designed to detect AI-generated or manipulated images.☆35Nov 26, 2025Updated 5 months ago
- This is writeup for Burp Suite room in tryhackme.com☆15Aug 8, 2020Updated 5 years ago
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- ☆34Mar 19, 2022Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 4 years ago
- Find DLLs with RWX section☆80Jul 3, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- New Framework Red Team Operations☆21Jun 7, 2021Updated 4 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- ☆18Jun 25, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆163Dec 19, 2021Updated 4 years ago