robertdavidgraham / nmap
Nmap - the Network Mapper. Github mirror of official SVN repository.
☆10Updated 6 years ago
Alternatives and similar repositories for nmap:
Users that are interested in nmap are comparing it to the libraries listed below
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- Results from some of our scans using masscan.☆12Updated 11 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 7 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- Parses DNS responses in a secure, rigorous manner☆21Updated 4 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- ☆12Updated 7 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 4 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Updated 10 years ago
- Rex library for various exploitation helpers☆22Updated this week
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Password cracking utility☆53Updated 4 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- ☆22Updated last year
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30Updated 9 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- Reverse shell for remote administration☆30Updated 7 years ago
- Security Advisories and Researches☆16Updated 10 years ago