mytechnotalent / turbo-scannerView external linksLinks
A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing your own network to ensure there are no malicious services running.
☆166Nov 26, 2025Updated 2 months ago
Alternatives and similar repositories for turbo-scanner
Users that are interested in turbo-scanner are comparing it to the libraries listed below
Sorting:
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆162Nov 26, 2025Updated 2 months ago
- An open-source Python Selenium Test Automation framework with Docker and Kubernetes integration.☆32Nov 26, 2025Updated 2 months ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Nov 26, 2025Updated 2 months ago
- A micro:bit entry-level Reverse Engineering tutorial code repo which was presented at the 2021 micro:bit LIVE event.☆12Nov 27, 2025Updated 2 months ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Nov 26, 2025Updated 2 months ago
- DC540 hacking challenge 0x00004 [C CTF].☆11Nov 26, 2025Updated 2 months ago
- ☆19Jun 16, 2021Updated 4 years ago
- A series of small ARM 64 bite-size articles to help one better reverse AArch64 ARM 64 Linux binaries.☆21Nov 27, 2025Updated 2 months ago
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆43Nov 26, 2025Updated 2 months ago
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 2 months ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Nov 26, 2025Updated 2 months ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- A step-by-step walkthrough of the inner workings of a simple neural network. The goal is to demystify the calculations behind neural netw…☆29Nov 26, 2025Updated 2 months ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- ☆11May 30, 2021Updated 4 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 8 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Dec 19, 2021Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Sep 4, 2021Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- this tool can spy on the devices in the local network devices with many options that can make sniffing on the local network so easy to ma…☆13Apr 20, 2017Updated 8 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.