vanhauser-thc / AutoNmapLinks
Automated daily scan using Nmap and report on the differences
☆21Updated 7 years ago
Alternatives and similar repositories for AutoNmap
Users that are interested in AutoNmap are comparing it to the libraries listed below
Sorting:
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆28Updated 7 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 6 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated last week
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- Various pentest stuff☆22Updated 6 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- ☆15Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 6 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Scripts to gather system configuration information for offline/remote auditing☆80Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Docker images for learning wifi hacking☆70Updated 6 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Updated 6 years ago