Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA version]
☆30Jan 15, 2026Updated last month
Alternatives and similar repositories for pynipper-ng
Users that are interested in pynipper-ng are comparing it to the libraries listed below
Sorting:
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆84Updated this week
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last week
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Dec 20, 2025Updated 2 months ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- ☆29May 19, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Auto powerful subdomains scanner - Auto check live subdomains☆18Jul 5, 2020Updated 5 years ago
- ELF Sectional docking payload injector system☆21Jun 28, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Useful scripts to maintain i-doit☆23Apr 11, 2025Updated 10 months ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Plugin for Cura slicer☆10Feb 1, 2023Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A Python obfuscator using HTTP Requests and Hastebin.☆50Jul 1, 2022Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 3 months ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆34Nov 24, 2022Updated 3 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- ☆10Oct 8, 2018Updated 7 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Nov 20, 2019Updated 6 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- ☆37Feb 12, 2018Updated 8 years ago
- ☆36Jun 23, 2022Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Sep 4, 2022Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- ☆90Jun 2, 2024Updated last year
- Extendable Python script handler for automating penetration testing.☆40Mar 3, 2023Updated 3 years ago
- ☆37Dec 26, 2021Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago