trustedsec / hardcidrLinks
hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified options will query ARIN and a pool of BGP route servers. The route server is selected at random at runtime.
☆370Updated 3 years ago
Alternatives and similar repositories for hardcidr
Users that are interested in hardcidr are comparing it to the libraries listed below
Sorting:
- Easy 802.1Q VLAN Hopping☆378Updated 9 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆472Updated 2 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆353Updated last year
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆251Updated 2 weeks ago
- Password spraying using AWS Lambda for IP rotation☆630Updated 2 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆168Updated 7 years ago
- a tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC3 chain☆201Updated 2 years ago
- AWS S3 Bucket/Object Finder☆120Updated 4 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆336Updated 6 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆629Updated 2 years ago
- Search exposed EBS volumes for secrets☆297Updated 2 years ago
- The IKE Scanner☆383Updated 10 months ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆187Updated last year
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support☆296Updated 2 months ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- Respounder detects presence of responder in the network.☆317Updated 6 years ago
- A passive subdomain finder☆330Updated 2 years ago
- A script for credentials-based attack surface enumeration and general reconnaissance of massive networks☆453Updated 3 weeks ago
- AI-based, context-driven network device ranking☆298Updated last year
- Issues to consider when planning a red team exercise.☆619Updated 7 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- IPFuscator - A tool to automatically generate alternative IP representations☆372Updated last year
- locate and attack Lync/Skype for Business☆340Updated 9 months ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆251Updated 2 months ago
- ☆236Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 5 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆194Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆526Updated 2 years ago
- rdp-sec-check is a Perl script to enumerate security settings of an RDP Service (AKA Terminal Services)☆221Updated last year
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆368Updated 11 months ago