r4ulcl / nTaskLinks
nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and WebSockets. It handles task requests, distributes them to available workers, and stores the results in a database or sends them to a specified URL/API. Integration with other APIs or scripts is also supported.
☆14Updated last month
Alternatives and similar repositories for nTask
Users that are interested in nTask are comparing it to the libraries listed below
Sorting:
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated last year
- masscan with exclusive excludes☆58Updated last year
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago
- Quickly find all identities someone has used on their Github commits☆16Updated last year
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆34Updated last year
- RabbitMQ exploit and Pentesting guide for penetration tester☆17Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 2 months ago
- Unicode Security Toolkit☆37Updated 10 months ago
- Fast website scraper and wordlist generator☆81Updated 3 months ago
- Fast Path Traversal exploitation tool☆21Updated last year
- A tech enumeration toolkit focused on 404 Not found pages.☆25Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 8 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- Exploits Unauth Docker API☆41Updated 4 months ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆37Updated last year
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 8 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆46Updated 7 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 10 months ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 5 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- ☆28Updated 2 years ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 4 months ago
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆23Updated last year
- aws cli pentesting/red team snippets☆32Updated last year
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year