vanhauser-thc / AutoNmapLinks
Automated daily scan using Nmap and report on the differences
☆20Updated 7 years ago
Alternatives and similar repositories for AutoNmap
Users that are interested in AutoNmap are comparing it to the libraries listed below
Sorting:
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated last month
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Command line interface to interact with hashes.com escrow service.☆41Updated 5 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 6 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 9 months ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆89Updated 4 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆17Updated 8 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆80Updated 2 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆72Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandbox☆37Updated 10 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Updated 5 years ago
- Hash cracking WebApp & Server for hashcat☆46Updated 3 years ago
- ☆14Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 2 months ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆74Updated 2 years ago
- NSE script which leverages the Censys Search API for passive data collection☆57Updated 4 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago