yavuzatlas / Vulmap-WindowsView external linksLinks
Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vulnerabilities with available exploits. All found exploits can be downloaded by Vulmap.
☆33Aug 1, 2021Updated 4 years ago
Alternatives and similar repositories for Vulmap-Windows
Users that are interested in Vulmap-Windows are comparing it to the libraries listed below
Sorting:
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- ☆25Mar 21, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Dec 11, 2025Updated 2 months ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Projects For the HackRF One☆14Aug 13, 2014Updated 11 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 9 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆20Jan 16, 2019Updated 7 years ago
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Jan 1, 2019Updated 7 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 5 years ago
- Scripts for hacking through wireless network [WiFi]☆26Oct 16, 2022Updated 3 years ago
- This is a basic Python script that accepts a website's url in string format to initiate a DDoS attack. For educational purposes only.☆14Jan 3, 2015Updated 11 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- ☆25May 30, 2017Updated 8 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Phishing Tool☆24Feb 19, 2018Updated 7 years ago
- Using a Raspberry Pi and a HackRF One to locate and graph RF signals on a Python3 Flask Web Server☆22May 1, 2019Updated 6 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- Script Spam Call☆22Sep 23, 2020Updated 5 years ago
- Tiny WiFi sniffer with Scapy for MAC OS X☆22Oct 18, 2014Updated 11 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Jun 12, 2021Updated 4 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆46Oct 25, 2025Updated 3 months ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- Exploit framework written in Go☆29Mar 2, 2018Updated 7 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- Airdrop Crazy☆57May 15, 2020Updated 5 years ago
- 😈 The Demon App Store☆30Aug 18, 2021Updated 4 years ago
- ☆30Apr 16, 2020Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago