trustedsec / hardcidrLinks
hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified options will query ARIN and a pool of BGP route servers. The route server is selected at random at runtime.
☆382Updated 4 years ago
Alternatives and similar repositories for hardcidr
Users that are interested in hardcidr are comparing it to the libraries listed below
Sorting:
- Easy 802.1Q VLAN Hopping☆390Updated 9 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆256Updated last week
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆481Updated 3 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170Updated 7 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆366Updated 5 months ago
- a tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC3 chain☆216Updated 2 years ago
- AWS S3 Bucket/Object Finder☆123Updated 4 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Updated 2 years ago
- AI-based, context-driven network device ranking☆302Updated 2 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆345Updated 7 years ago
- Respounder detects presence of responder in the network.☆322Updated 6 years ago
- Password spraying using AWS Lambda for IP rotation☆658Updated 2 years ago
- Search exposed EBS volumes for secrets☆303Updated 2 years ago
- LinkedIn reconnaissance tool☆55Updated 4 years ago
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support☆301Updated 2 months ago
- A script for credentials-based attack surface enumeration and general reconnaissance of massive networks☆469Updated 7 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆641Updated 3 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- ☆251Updated 6 years ago
- The IKE Scanner☆407Updated last year
- ☆238Updated 5 years ago
- Issues to consider when planning a red team exercise.☆619Updated 8 years ago
- locate and attack Lync/Skype for Business☆346Updated last year
- Passive internal reconnaissance tool☆73Updated 3 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆658Updated 2 weeks ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago
- (Unofficial) Python API for https://crt.sh☆148Updated 4 years ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆230Updated 6 years ago
- This document describes common misconfigurations of F5 Networks BigIP systems.☆234Updated 6 years ago
- Awesome Nmap Grep☆393Updated 6 years ago