pradeepjairamani / nmappy
Automating and Enhancing Nmap using Python
☆17Updated 6 years ago
Alternatives and similar repositories for nmappy:
Users that are interested in nmappy are comparing it to the libraries listed below
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- All xxx-arsenal repos in one☆15Updated 6 years ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- This is a source mirror for 0trace.☆12Updated 11 years ago
- simple script to pwn android phone with physical access☆23Updated 6 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 6 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- The tools that I use and recommend.☆7Updated 7 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Search bing with python☆12Updated 10 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Updated 8 years ago
- Mass HTTP brute forcer to detect directories and interesting technologies☆10Updated 8 years ago
- async web crawler☆26Updated 10 years ago
- misc scripts☆21Updated this week
- A default credential scanner.☆9Updated 6 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆17Updated 8 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆31Updated 9 years ago
- Automated Mass Exploiter☆12Updated 5 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Various exploits☆10Updated 7 years ago
- OS Hardening scripts for multiple linux based operating systems. Keep in mind this is the minimum!☆19Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 8 months ago