vanhauser-thc / AutoNmap
Automated daily scan using Nmap and report on the differences
☆21Updated 7 years ago
Alternatives and similar repositories for AutoNmap:
Users that are interested in AutoNmap are comparing it to the libraries listed below
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆10Updated 3 years ago
- ☆14Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated last month
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Python port of Pipal for password analytics☆22Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 4 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- ☆19Updated 7 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Orb is a massive footprinting tool.☆46Updated 5 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆19Updated 2 months ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago