xen0vas / vscan
vulnerability scanner tool using nmap and nse scripts
☆207Updated 8 months ago
Alternatives and similar repositories for vscan:
Users that are interested in vscan are comparing it to the libraries listed below
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆219Updated 9 months ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆249Updated 5 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆205Updated 6 years ago
- unix SSH post-exploitation 1337 tool☆136Updated 6 years ago
- Phishing Template Generation Made Easy☆164Updated 7 years ago
- Wavestone's web interface for password cracking with hashcat☆169Updated 3 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆120Updated last year
- search for hosts info with shodan☆231Updated 3 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆285Updated 5 years ago
- Let's find someone's account☆163Updated 5 years ago
- Common password pattern generator using strings list☆131Updated 4 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆201Updated 3 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- network reconnaissance toolkit☆423Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆246Updated 9 months ago
- Python API wrapper and command-line client for the tools hosted on spyse.com.☆271Updated 4 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449Updated 2 years ago
- locate and attack Lync/Skype for Business☆336Updated 6 months ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- Penetration testing scripts☆142Updated 6 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆115Updated 4 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆277Updated 9 years ago
- R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environmen…☆227Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Automate Metasploit scanning and exploitation☆115Updated 6 months ago
- Network Pivoting Toolkit☆442Updated last year
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆157Updated 11 months ago