welchbj / bscanLinks
an asynchronous target enumeration tool
☆244Updated 2 years ago
Alternatives and similar repositories for bscan
Users that are interested in bscan are comparing it to the libraries listed below
Sorting:
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- locate and attack Lync/Skype for Business☆338Updated 8 months ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- Search Exploitable Software on Linux☆230Updated 2 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆256Updated last month
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Linux post exploitation enumeration and exploit checking tools☆180Updated 5 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆251Updated 2 weeks ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆250Updated 5 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 6 years ago
- Burp Suite extension to discover assets from HTTP response.☆227Updated 5 months ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆401Updated 4 years ago
- For all your network pentesting needs☆154Updated 11 months ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆224Updated last year
- Hawkeye filesystem analysis tool☆235Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 4 years ago
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆146Updated 6 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆139Updated 6 years ago
- Collection of different exploits☆182Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- Collect information about email addresses from Pastebin☆36Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year