Python Tool for Host Enumeration
☆50Mar 24, 2017Updated 8 years ago
Alternatives and similar repositories for WrapMap
Users that are interested in WrapMap are comparing it to the libraries listed below
Sorting:
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- ☆51Jun 24, 2016Updated 9 years ago
- ☆26Sep 1, 2017Updated 8 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Jun 8, 2018Updated 7 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- ☆510May 27, 2018Updated 7 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- ☆13Apr 29, 2016Updated 9 years ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- Personal Collection of Operating Systems Scripts☆572May 16, 2024Updated last year
- ☆26Sep 2, 2016Updated 9 years ago
- Bash-completion script for Nmap☆73May 24, 2017Updated 8 years ago
- A collection of useful scripts for Cobalt Strike☆172Aug 15, 2024Updated last year
- Post Exploitation Collection☆1,571May 1, 2020Updated 5 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago
- Limit user logins by IP using pam_exec module☆12Aug 21, 2016Updated 9 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Oct 2, 2015Updated 10 years ago
- PwnWiki - The notes section of the pentesters mind.☆564Oct 22, 2018Updated 7 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Linux Exploit Suggester; based on operating system release number☆1,809May 19, 2014Updated 11 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- A collection of Nmap NSE scripts that I made.☆30Jan 14, 2013Updated 13 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Network Infrastructure Penetration Testing Tool☆1,668Jun 2, 2021Updated 4 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago