pry0cc / mapper
A tool to run nmap against each line in a script.
☆17Updated 4 years ago
Alternatives and similar repositories for mapper:
Users that are interested in mapper are comparing it to the libraries listed below
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- ☆14Updated last year
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 4 years ago
- Validate proxies for specific domain☆35Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Cloud metadata extraction tools and scripts☆34Updated last year
- Fast dns resolver☆13Updated 11 months ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Jast (Just Another Screenshot Tool)☆10Updated 5 years ago
- ☆10Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- ☆14Updated 3 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- Data exfiltration using DNS☆23Updated 5 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 4 years ago