nccgroup / port-scan-automationLinks
Automate NMAP Scans and Generate Custom Nessus Policies Automatically
☆136Updated 12 years ago
Alternatives and similar repositories for port-scan-automation
Users that are interested in port-scan-automation are comparing it to the libraries listed below
Sorting:
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- Useful pentesting scripts☆83Updated 4 months ago
- Attack Knowledge Base☆100Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- ☆194Updated 6 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Phishing Template Generation Made Easy☆164Updated 7 years ago
- Search drives for documents containing passwords☆63Updated 10 years ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- Meterpreter Scripts that I'm working on☆174Updated 6 years ago
- Easy Window domain access☆51Updated 11 years ago
- myBFF - a Brute Force Framework☆140Updated 3 months ago
- A JBoss script for obtaining remote shell access☆172Updated 4 years ago
- Linux pentest tools☆88Updated 5 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Vulnerability scanner based on vulners.com audit API☆64Updated 6 years ago
- SMB Relay Attack Script☆149Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 9 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- Automatically performs the SMB relay attack☆72Updated 9 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆96Updated 2 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 10 years ago