sathish09 / zsh_plugins
zsh plugin for metasploit framework
☆14Updated 7 years ago
Alternatives and similar repositories for zsh_plugins:
Users that are interested in zsh_plugins are comparing it to the libraries listed below
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Updated 7 years ago
- ☆61Updated 6 years ago
- ☆14Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Automated enumeration☆30Updated 3 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆26Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- A collection of useful scripts for penetration testers☆82Updated 12 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 5 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 9 months ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- another nmap summarising script☆25Updated 4 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- ☆8Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- ☆25Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago