trustedsec / hardcidrLinks
hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified options will query ARIN and a pool of BGP route servers. The route server is selected at random at runtime.
☆370Updated 3 years ago
Alternatives and similar repositories for hardcidr
Users that are interested in hardcidr are comparing it to the libraries listed below
Sorting:
- Easy 802.1Q VLAN Hopping☆378Updated 9 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆351Updated last year
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆250Updated 2 months ago
- Issues to consider when planning a red team exercise.☆619Updated 7 years ago
- Password spraying using AWS Lambda for IP rotation☆627Updated 2 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆471Updated 2 years ago
- A passive subdomain finder☆329Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆483Updated 11 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 11 months ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- a tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC3 chain☆200Updated 2 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 4 years ago
- A highly configurable Framework for easy automated web scanning☆375Updated 4 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆167Updated 7 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆366Updated 10 months ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- AWS S3 Bucket/Object Finder☆119Updated 3 years ago
- The IKE Scanner☆380Updated 8 months ago
- locate and attack Lync/Skype for Business☆337Updated 8 months ago
- External attack surface discovery, enumeration and reconnaissance for massive networks☆448Updated this week
- DNS Rebinding Exploitation Framework☆488Updated 4 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆334Updated 6 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆401Updated 4 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆249Updated 3 weeks ago
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support☆296Updated last month
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆560Updated 2 years ago
- Smart Install Exploitation Tool☆581Updated 3 years ago
- Lure - User Recon Automation for GoPhish☆163Updated last year