peplum / peplum-nmap
Distributed nmap.
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for peplum-nmap
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated this week
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆14Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 6 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 11 months ago
- ☆15Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆30Updated last week
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 weeks ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆47Updated 4 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Validate proxies for specific domain☆34Updated 3 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆28Updated last year
- Check whether an IP address or hostname belongs to popular cloud providers☆49Updated this week