pimvh / nrich
Nrich.py is a tool to query the shodan internetdb
☆12Updated 10 months ago
Alternatives and similar repositories for nrich:
Users that are interested in nrich are comparing it to the libraries listed below
- ☆55Updated 2 years ago
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Updated 7 months ago
- ☆64Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆94Updated 11 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆19Updated last week
- A command-line utility for performing reverse DNS lookups☆70Updated last year
- Repo for hosting rayder workflows☆60Updated last year
- Azure Service Subdomain Enumeration☆57Updated 7 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 11 months ago
- A repository with informtion related to Cloud Osint☆88Updated 3 weeks ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- This repository contains the files that provide the upload functionality in the IIS Server☆29Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Web Hacking and Red Teaming MindMap☆72Updated 2 years ago
- Striping CDN IPs from a list of IP Addresses☆77Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆39Updated 3 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆45Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- One line command and control backdoors for APIs and web applications.☆50Updated last year
- 1C RAS Offensive Security Tool☆25Updated last year
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Updated 2 months ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆78Updated 2 years ago
- Fast Path Traversal exploitation tool☆21Updated last year
- OWASP based Web Application Security Testing Checklist☆71Updated 9 months ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago