Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error
☆459Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for LetsMapYourNetwork
Users that are interested in LetsMapYourNetwork are comparing it to the libraries listed below
Sorting:
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- ☆128May 22, 2023Updated 2 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Feb 17, 2026Updated 2 weeks ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- network visualization & pentest reporting☆532May 2, 2023Updated 2 years ago
- Network Pivoting Toolkit☆456Aug 26, 2023Updated 2 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,338Dec 13, 2022Updated 3 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Jul 9, 2025Updated 7 months ago
- Firewall bypass script based on shodan search results☆14Jun 5, 2019Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- A powerful target reconnaissance framework powered by graph theory.☆419Oct 21, 2022Updated 3 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Oct 22, 2021Updated 4 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,844Mar 28, 2022Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆532Jan 13, 2026Updated last month
- Scanning pastebin with yara rules☆1,127Jan 10, 2026Updated last month
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,953Feb 20, 2026Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,908Jul 6, 2024Updated last year
- Red Team Tool Kit☆1,133Dec 8, 2022Updated 3 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆355Nov 3, 2020Updated 5 years ago
- an asynchronous target enumeration tool☆245Dec 8, 2022Updated 3 years ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,400Apr 8, 2024Updated last year
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago