vanhauser-thc / AutoNmap
Automated daily scan using Nmap and report on the differences
☆20Updated 7 years ago
Alternatives and similar repositories for AutoNmap:
Users that are interested in AutoNmap are comparing it to the libraries listed below
- ☆14Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- ☆22Updated 4 years ago
- WordPress version identification and vulnerability finder.☆30Updated 2 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆67Updated last year
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆22Updated 2 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆17Updated 11 months ago
- Hashes of infamous malware☆25Updated last year
- Brute force password selection for EAP-MD5 authentication exchanges☆22Updated 7 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago