threatexpress / portplowView external linksLinks
PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and services from multiple systems managed by a central console.
☆56Nov 19, 2024Updated last year
Alternatives and similar repositories for portplow
Users that are interested in portplow are comparing it to the libraries listed below
Sorting:
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- initial commit☆44Nov 19, 2024Updated last year
- SMB Named Pipe shell☆69Nov 19, 2024Updated last year
- ☆174Jan 31, 2018Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- A Django application to help red team operators manage a library of domain names☆167May 24, 2023Updated 2 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆359Nov 19, 2024Updated last year
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 9 years ago
- Event Data Collector☆40Jan 12, 2026Updated last month
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆609Jan 30, 2023Updated 3 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆251Nov 19, 2024Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆958Nov 18, 2020Updated 5 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- initial commit☆174Jun 11, 2018Updated 7 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,143Nov 19, 2024Updated last year
- ☆33Apr 20, 2022Updated 3 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- NetSPI HTTP Scrapers☆29Jul 9, 2019Updated 6 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,644Jun 6, 2024Updated last year
- ☆24Sep 26, 2021Updated 4 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆325Apr 26, 2020Updated 5 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated 3 weeks ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 8 years ago
- ☄️ go-out - A Golang egress buster.☆126Feb 6, 2026Updated last week