vanhauser-thc / AutoNmapLinks
Automated daily scan using Nmap and report on the differences
☆21Updated 7 years ago
Alternatives and similar repositories for AutoNmap
Users that are interested in AutoNmap are comparing it to the libraries listed below
Sorting:
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- Various pentest stuff☆21Updated 5 months ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated last year
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆72Updated 9 months ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 5 months ago
- Extract credentials and other useful info from network captures☆73Updated 2 years ago
- Faraday's Command Line Interface☆51Updated this week
- on-the-fly☆85Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- ☆14Updated 4 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 10 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 4 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated 2 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆49Updated 3 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆76Updated 2 years ago
- Docker images for learning wifi hacking☆69Updated 6 years ago
- Command line interface to interact with hashes.com escrow service.☆37Updated last month
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago