PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and services from multiple systems managed by a central console.
☆57Nov 19, 2024Updated last year
Alternatives and similar repositories for portplow
Users that are interested in portplow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Nov 6, 2016Updated 9 years ago
- initial commit☆44Nov 19, 2024Updated last year
- SMB Named Pipe shell☆69Nov 19, 2024Updated last year
- ☆174Jan 31, 2018Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆371Nov 19, 2024Updated last year
- A Django application to help red team operators manage a library of domain names☆167May 24, 2023Updated 2 years ago
- Currently not updated for WMIEvent module...☆263Feb 23, 2016Updated 10 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆609Jan 30, 2023Updated 3 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆956Nov 18, 2020Updated 5 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆249Nov 19, 2024Updated last year
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆21Nov 15, 2018Updated 7 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,147Nov 19, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Event Data Collector☆40Mar 23, 2026Updated last month
- Fingerprint a web app using local files as the fingerprint sources☆39May 16, 2017Updated 8 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,656Jun 6, 2024Updated last year
- initial commit☆174Jun 11, 2018Updated 7 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Look at your vim, now look back at mine, now back to your vim, now back to mine. Sadly it isn't mine, but if you stopped using your own d…☆19Mar 5, 2025Updated last year
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆57Dec 3, 2016Updated 9 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Easy & Flexible Alerting With ElasticSearch☆19Dec 18, 2015Updated 10 years ago
- .NET 4.0 Project to interact with video, audio and keyboard hardware.☆218Sep 27, 2019Updated 6 years ago
- ☆29Oct 1, 2025Updated 6 months ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆18May 6, 2023Updated 2 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆251Sep 25, 2018Updated 7 years ago
- Use a specific markdown file to write proper formatted papers and articles.☆21Jan 29, 2012Updated 14 years ago