pry0cc / mapper
A tool to run nmap against each line in a script.
☆16Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for mapper
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆12Updated 4 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- ☆10Updated 5 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Pythonize Intruder Payload☆13Updated 3 years ago
- Cloud metadata extraction tools and scripts☆34Updated last year
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 3 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Sniper. Passive Secrets Hunting.🚬☆12Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆10Updated last year
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 4 years ago
- ☆14Updated 3 years ago
- Install and upgrade projectdiscovery tools☆10Updated 2 years ago
- Standardizing Security Titles☆13Updated last year
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- Simple scripts aiding penetration testing process☆12Updated 4 years ago
- Validate proxies for specific domain☆34Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆42Updated last year
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- Kibana app for RedELK☆16Updated last year
- Command List for Hashcat and default keyspaces.☆14Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year