ncaio / mxmap
[- mxmap -]
☆11Updated 3 years ago
Alternatives and similar repositories for mxmap:
Users that are interested in mxmap are comparing it to the libraries listed below
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Updated 4 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Collection of dockerfiles to build containers☆13Updated 6 years ago
- Protect your parents from phishing☆39Updated 7 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- RipGit - Scanner/Scraper of git source deployed☆16Updated 6 years ago
- Hardening Tool for *nixes☆50Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- post-exploitation tools☆15Updated 6 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- a linux process hacker tool☆83Updated 5 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- A very simple Python script to take screenshots of websites☆17Updated 7 years ago
- A collection of useful scripts for penetration testers☆82Updated 12 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- try privilege escalation changing sudo command☆119Updated 6 years ago
- SSH Multipot☆22Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- ☆14Updated 6 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- cuz life is scriptable...☆25Updated 8 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- Lair Framework dockerized.☆37Updated 3 years ago