TCP port scanning through SYN flood protected networks
☆47Nov 28, 2017Updated 8 years ago
Alternatives and similar repositories for cookiescan
Users that are interested in cookiescan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- blacksheepwall is a hostname reconnaissance tool☆300Apr 25, 2020Updated 5 years ago
- Anti Ports Scanning IP/ISP List(Global Scanning Blacklist of friendly-civilized use Masscan/ZMap)☆10Dec 14, 2019Updated 6 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Code generator for binary parsing☆20Feb 1, 2020Updated 6 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- Collection of small JavaScript functions and scripts that can be used in the browser to interact with Lair☆22Mar 20, 2019Updated 7 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆17Jul 22, 2016Updated 9 years ago
- It's a quick HTTPS server.☆14Oct 7, 2022Updated 3 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- ☆11May 16, 2019Updated 6 years ago
- Quick and Dirty full-connect scanner. Meant for when `nmap -Pn -p-` is too slow☆20Jul 1, 2016Updated 9 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆31Feb 10, 2025Updated last year
- ☆51Feb 5, 2014Updated 12 years ago
- Program to analyze mails stored into a Microsoft Outlook PST file and find one based on search keywords.☆58May 1, 2019Updated 6 years ago
- QUIC tunnel☆15Oct 28, 2017Updated 8 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 8 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- A nodejs http forwarder : small library that listens to http(s) requests and forwards them to a list of target servers.☆12Jun 16, 2022Updated 3 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Jan 1, 2021Updated 5 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Nov 19, 2024Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆46Feb 27, 2024Updated 2 years ago
- ☆11Apr 15, 2021Updated 4 years ago
- Documentation generator for the Go programming language☆11Apr 21, 2011Updated 14 years ago
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- A Usenet binary grabber.☆12Nov 6, 2015Updated 10 years ago
- A geometry based dynamic lighting engine.☆25Dec 15, 2013Updated 12 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- Interact with Windows RPC Services over SMB using go-smb☆11Feb 27, 2026Updated 3 weeks ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆28Dec 19, 2025Updated 3 months ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago