Automating and Enhancing Nmap using Python
☆17Apr 18, 2018Updated 7 years ago
Alternatives and similar repositories for nmappy
Users that are interested in nmappy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 12 years ago
- Read EMV cards with NFC☆16Apr 14, 2014Updated 11 years ago
- CLI Tools to open, extract and mount FTK Imager's AccessData AD1 forensic images on linux.☆19May 27, 2025Updated 10 months ago
- A mass communicator module for the WiFi Pineapple that utilizes TLS to control a botnet of compromised systems.☆15Jul 18, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This is a library for extended memory support on the Atmega2560 microcontroller.☆12Nov 26, 2013Updated 12 years ago
- A MagSpoof build using STM32☆14Jul 27, 2020Updated 5 years ago
- PMKID Attack Module for the WiFi Pineapple☆17Jul 14, 2023Updated 2 years ago
- ESP32 based version of WireShark compatible nRF24/RFM7x packet sniffer☆12May 2, 2020Updated 5 years ago
- My BashBunny scripts☆19Feb 15, 2018Updated 8 years ago
- beside-ng module for the WiFi Pineapple☆14Apr 20, 2024Updated last year
- Extension for colcon to support CMake packages☆18Jan 29, 2026Updated last month
- digispark Attiny 85 payloads and scripts☆14Dec 14, 2024Updated last year
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This project showcases how to exploit vulnerabilities in NFC cards using Arduino and RFID technology. By leveraging the MFRC522 RFID modu…☆16Jul 4, 2023Updated 2 years ago
- nRF24l01 Driver/Library for ESP32 (esp-idf)☆19Jul 24, 2018Updated 7 years ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- Raspberry Pi RP2040 OpenOCD☆16Aug 12, 2022Updated 3 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Android Toasts -- Simple user feedback about background operations☆14Oct 7, 2013Updated 12 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- a script taht brut force the cvv code of credit card's☆17Jul 4, 2021Updated 4 years ago
- Wraps the BMW ConnectedDrive authentication mechanisms and outputs json files for every vehicle☆13Mar 10, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- IIS PUT WebDAV GetShell Exploit☆18Aug 15, 2020Updated 5 years ago
- A lightweight, python implementation of onion routing used by tor. This is a proof of concept where the user enters a web url on the comm…☆12Dec 26, 2022Updated 3 years ago
- Saleae ARM Serial Wire Debug (SWD) Analyzer☆20Oct 23, 2023Updated 2 years ago
- Implement Samy's magspoof on Arduino Nano☆18Dec 11, 2015Updated 10 years ago
- unblocked web browser for school☆10Dec 17, 2021Updated 4 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Simple file sharing over tor hidden services (v3)☆28Nov 20, 2019Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- PHP dynamic image IP logger utilizing htaccess mod_rewrite.☆12Sep 23, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆17Jul 2, 2024Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25May 23, 2022Updated 3 years ago
- This is a script that scans an IP address or URL for SQL Injection vulnerabilities. If any are found, it includes an extensive library of…☆16Jul 22, 2024Updated last year
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Cheap NFCReader with Arduino Uno CH340☆20Apr 25, 2018Updated 7 years ago