☆47Nov 18, 2015Updated 10 years ago
Alternatives and similar repositories for Nmap-Scripts
Users that are interested in Nmap-Scripts are comparing it to the libraries listed below
Sorting:
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- ☆104Jan 18, 2026Updated 2 months ago
- ☆23Oct 14, 2013Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A collection of nmap scripts I've written☆23Mar 27, 2016Updated 9 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- A portable console aimed at making pentesting with PowerShell a little easier.☆48Apr 4, 2017Updated 8 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Maltego Transforms, Machines and other extentions☆45Jul 17, 2015Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Rogue AP killer☆92Jan 24, 2018Updated 8 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Nmap NSE scripts☆28Feb 1, 2022Updated 4 years ago
- ☆43Sep 2, 2016Updated 9 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- A firefox profile for web security enthusiasts (Supposed to be configured with woobuntu )☆10Jul 6, 2016Updated 9 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- A cms discover recognize tool in python☆19Dec 15, 2015Updated 10 years ago
- ☆59May 1, 2019Updated 6 years ago
- Powershell Persistence Locator☆67Sep 11, 2016Updated 9 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago