xen0vas / vscan
vulnerability scanner tool using nmap and nse scripts
☆207Updated 9 months ago
Alternatives and similar repositories for vscan:
Users that are interested in vscan are comparing it to the libraries listed below
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆221Updated 10 months ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆205Updated 6 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆249Updated 5 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆121Updated last year
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago
- Python API wrapper and command-line client for the tools hosted on spyse.com.☆271Updated 4 years ago
- search for hosts info with shodan☆231Updated 3 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆125Updated 6 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆165Updated 4 years ago
- Phishing Template Generation Made Easy☆164Updated 7 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- unix SSH post-exploitation 1337 tool☆137Updated 6 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- A unified console to perform the "kill chain" stages of attacks.☆204Updated last year
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆146Updated 6 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆182Updated 4 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- Network Pivoting Toolkit☆444Updated last year
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆316Updated 4 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆115Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 10 months ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆160Updated 7 years ago
- Advanced web server fingerprinting for Nmap☆129Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- Collection of different exploits☆182Updated 4 years ago
- Wavestone's web interface for password cracking with hashcat☆170Updated 3 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆201Updated 3 years ago