Incursore came from nmapAutomator to be your personal raider while you enumerate a target.
☆52Jul 12, 2024Updated last year
Alternatives and similar repositories for incursore
Users that are interested in incursore are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- ☆14Nov 18, 2021Updated 4 years ago
- This repository outlines my OSCP-focused methodology, specifically targeting common port numbers encountered during penetration testing. …☆24Jul 21, 2021Updated 4 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Our OSCP repo: from popping shells to mental health.☆361May 31, 2022Updated 3 years ago
- Markdown repo for notes on all things redteaming☆52Apr 19, 2024Updated last year
- Parameter discovery and fuzzing tool☆12Oct 25, 2022Updated 3 years ago
- A BOF for lazy people☆24Apr 4, 2024Updated last year
- Scripts I created to pass the OSCP☆22Jul 23, 2021Updated 4 years ago
- BugBounty Hub: Your one-stop destination for Bug Bounty excellence! Explore Nuclei Templates and BugBounty Worldlists for comprehensive …☆16Apr 3, 2025Updated 11 months ago
- Our repo for crushing through RTO course & labs.☆37Sep 12, 2022Updated 3 years ago
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Jan 29, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- OSCP Methodology☆57Sep 6, 2023Updated 2 years ago
- PHP Script demonstrating a smart honey pot.☆18Apr 19, 2014Updated 11 years ago
- A plugin for Burp Suite Pro that uses the GraphQL schema to begin Active Scanning the entire endpoint.☆41Oct 20, 2025Updated 5 months ago
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆50Jun 1, 2021Updated 4 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 6 months ago
- ☆12Aug 5, 2023Updated 2 years ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated 2 months ago
- My OSCP cheat sheet☆22Aug 4, 2024Updated last year
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SharpUp is a C# port of various PowerUp functionality.☆1,472Feb 14, 2024Updated 2 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆78Dec 2, 2024Updated last year
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine☆72Mar 22, 2026Updated last week
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- https://academy.tcm-sec.com/☆178Jun 9, 2025Updated 9 months ago
- Detect, analyze, test and Attack JSON Web Tokens in web traffic☆27Mar 13, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆18Sep 9, 2025Updated 6 months ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆13Dec 30, 2024Updated last year
- Penelope Shell Handler☆1,614Mar 16, 2026Updated last week
- ☆13May 27, 2020Updated 5 years ago
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago