ra1nb0rn / avainLinks
A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
☆67Updated 4 years ago
Alternatives and similar repositories for avain
Users that are interested in avain are comparing it to the libraries listed below
Sorting:
- ☆46Updated 4 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- A subdomain reconnaissance scanner☆36Updated 3 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- Clickjacking PoC Generator☆35Updated 5 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Automate Metasploit scanning and exploitation☆116Updated 5 months ago
- Credentials Checking Framework☆53Updated 2 years ago