An nmap script to produce target lists for use with various tools.
☆33May 13, 2021Updated 4 years ago
Alternatives and similar repositories for nlist
Users that are interested in nlist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Nov 24, 2021Updated 4 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 5 months ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- Advanced web server fingerprinting for Nmap☆129Sep 29, 2017Updated 8 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 4 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆149Dec 3, 2020Updated 5 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆285Jun 16, 2023Updated 2 years ago
- web-based-fuzzer☆32Jun 26, 2020Updated 5 years ago
- A tool for collecting RDP, web and VNC screenshots all in one place☆482Apr 3, 2023Updated 2 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Feb 26, 2020Updated 6 years ago
- Compiles a list of major CDN and WAF subnets.☆67Updated this week
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- nse script to inject jndi payloads☆46Dec 13, 2021Updated 4 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- ☆18Jul 26, 2021Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆157Jun 9, 2023Updated 2 years ago
- GoWC - Wildcard cleaner for MassDNS☆24Jun 10, 2022Updated 3 years ago
- DEbian Cve REproducer Tool☆27Jan 8, 2026Updated 2 months ago
- ☆30Jun 27, 2022Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year