Python Tool for Host Enumeration
☆50Mar 24, 2017Updated 8 years ago
Alternatives and similar repositories for WrapMap
Users that are interested in WrapMap are comparing it to the libraries listed below
Sorting:
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- ☆51Jun 24, 2016Updated 9 years ago
- ☆26Sep 1, 2017Updated 8 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆627Jun 8, 2018Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- ☆509May 27, 2018Updated 7 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- ☆13Apr 29, 2016Updated 9 years ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Wireshark regression tests☆11Jan 21, 2021Updated 5 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆11Feb 10, 2013Updated 13 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Personal Collection of Operating Systems Scripts☆570May 16, 2024Updated last year
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- Post Exploitation Collection☆1,569May 1, 2020Updated 5 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Limit user logins by IP using pam_exec module☆12Aug 21, 2016Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- A collection of useful scripts for Cobalt Strike☆172Aug 15, 2024Updated last year
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago
- PwnWiki - The notes section of the pentesters mind.☆564Oct 22, 2018Updated 7 years ago
- Template for a Python application installer☆18Mar 29, 2014Updated 11 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- ☆12Dec 16, 2016Updated 9 years ago