introduction to distributed scanning using vultr
☆10Apr 29, 2017Updated 8 years ago
Alternatives and similar repositories for DistributedScanning
Users that are interested in DistributedScanning are comparing it to the libraries listed below
Sorting:
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆35Aug 24, 2022Updated 3 years ago
- A POC reverse shell that can utilize multiple major web-browsers to provide remote access. Intended to demonstrate remote control of an e…☆13Dec 1, 2016Updated 9 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 8 months ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Jan 3, 2020Updated 6 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Jul 30, 2024Updated last year
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- ☆65May 26, 2016Updated 9 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- Penetration testing on windows(7 or 8)☆25Oct 21, 2020Updated 5 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Scans packages in npm and pypi for secrets☆31Nov 4, 2019Updated 6 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆38Mar 4, 2020Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- IntegratedML samples to be used as a template☆11Dec 27, 2025Updated 2 months ago