toolswatch / SSALinks
Open Standard Vulnerability & Compliance Scanner
☆45Updated 9 years ago
Alternatives and similar repositories for SSA
Users that are interested in SSA are comparing it to the libraries listed below
Sorting:
- DPE - Default Password Enumeration☆35Updated 12 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Just a collection of scripts☆40Updated 5 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 8 years ago
- Side Channel script☆25Updated 2 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- Software exploitation training material☆16Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago
- The User Interface for GoCrack☆88Updated 3 weeks ago
- PHP Phishing Framework☆28Updated 11 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Short little AV Test to check Detection Rates☆22Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Get clients and access points.☆49Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago