PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and services from multiple systems managed by a central console.
☆57Nov 19, 2024Updated last year
Alternatives and similar repositories for portplow
Users that are interested in portplow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Nov 6, 2016Updated 9 years ago
- initial commit☆44Nov 19, 2024Updated last year
- SMB Named Pipe shell☆69Nov 19, 2024Updated last year
- ☆174Jan 31, 2018Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆370Nov 19, 2024Updated last year
- A Django application to help red team operators manage a library of domain names☆167May 24, 2023Updated 2 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆611Jan 30, 2023Updated 3 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆957Nov 18, 2020Updated 5 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆250Nov 19, 2024Updated last year
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆21Nov 15, 2018Updated 7 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,146Nov 19, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Event Data Collector☆39Mar 23, 2026Updated 2 weeks ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,650Jun 6, 2024Updated last year
- initial commit☆174Jun 11, 2018Updated 7 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Look at your vim, now look back at mine, now back to your vim, now back to mine. Sadly it isn't mine, but if you stopped using your own d…☆19Mar 5, 2025Updated last year
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆57Dec 3, 2016Updated 9 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 5 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆658Aug 19, 2019Updated 6 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Easy & Flexible Alerting With ElasticSearch☆19Dec 18, 2015Updated 10 years ago
- .NET 4.0 Project to interact with video, audio and keyboard hardware.☆219Sep 27, 2019Updated 6 years ago
- ☆29Oct 1, 2025Updated 6 months ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆18May 6, 2023Updated 2 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆251Sep 25, 2018Updated 7 years ago
- Use a specific markdown file to write proper formatted papers and articles.☆21Jan 29, 2012Updated 14 years ago