☆97Jun 12, 2025Updated 10 months ago
Alternatives and similar repositories for llm-tools-nmap
Users that are interested in llm-tools-nmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Aug 11, 2018Updated 7 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- A slightly more fun way to disable windows defender☆52May 4, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 7 months ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- OWASP WSTG Türkçe Rehber☆16Apr 9, 2025Updated last year
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- SANS Slingshot Linux Distribution☆56Nov 2, 2020Updated 5 years ago
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆22Feb 11, 2026Updated 2 months ago
- An open-source, self-hosted, and non-custodial solution for receiving cryptocurrency donations.☆36Jul 1, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- MCP Server for Ghidra☆20Jul 1, 2025Updated 10 months ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆22May 23, 2024Updated last year
- ☆36Mar 28, 2025Updated last year
- ☆30Jul 8, 2020Updated 5 years ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆29Apr 4, 2025Updated last year
- ☆12Aug 22, 2017Updated 8 years ago
- A privacy focused, Chromium browser for web scraping. Built with Tor and PySide6 (a QT framework).☆10Mar 13, 2023Updated 3 years ago
- Webshell Jumping Edition☆29May 9, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- LDAP Enumeration Tool☆13Mar 28, 2024Updated 2 years ago
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated last year
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆15May 10, 2023Updated 2 years ago
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- SilverTGOSINT is a Telegram OSINT tool that collects messages from target users in Telegram groups and tracks users who extract data from…☆53May 1, 2025Updated last year
- ☆12Dec 6, 2022Updated 3 years ago
- Ping Monster v1.9 - a freeware ping monitoring tool, with some alert actions like: send email, sound alert, http post.☆11Sep 6, 2023Updated 2 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Feb 20, 2025Updated last year
- Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. …☆47Feb 28, 2025Updated last year
- An Android application for streaming audio over a local network. It allows you to stream your Android device's internal audio to any devi…☆44Apr 26, 2026Updated last week
- A list of professions, apps, and human activities that are ripe for replacement by artificial intelligence. But not really.☆20Dec 3, 2024Updated last year
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago