altprobecollector for XDR and security posture service
Stars: ✭ 62 (-70.05%)
Asset Scanasset-scan是一款适用甲方企业的外网资产周期性扫描监控系统
Stars: ✭ 149 (-28.02%)
PbscanFaster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.
Stars: ✭ 122 (-41.06%)
Nmap ErpscanNmap custom probes for better detecting SAP services
Stars: ✭ 96 (-53.62%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-37.2%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+1013.53%)
Pingtunnelping tunnel is a tool that advertises tcp/udp/socks5 traffic as icmp traffic for forwarding.
Stars: ✭ 1,904 (+819.81%)
Nndefacctsnnposter's alternate fingerprint dataset for Nmap script http-default-accounts
Stars: ✭ 180 (-13.04%)
WhatwafDetect and bypass web application firewalls and protection systems
Stars: ✭ 1,881 (+808.7%)
GldGo shellcode LoaDer
Stars: ✭ 91 (-56.04%)
WinpayloadsUndetectable Windows Payload Generation
Stars: ✭ 1,211 (+485.02%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-36.23%)
Ip AttackAuto IP or Domain Attack Tool ( #1 )
Stars: ✭ 162 (-21.74%)
Msploitego Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-40.1%)
WebmapA Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-9.18%)
Masscan to nmap基于masscan和nmap的快速端口扫描和指纹识别工具,优化版本(获取标题,页面长度,过滤防火墙)
Stars: ✭ 112 (-45.89%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-22.71%)
Biu网络资产发现、漏洞扫描
Stars: ✭ 199 (-3.86%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+535.75%)
UnimapScan only once by IP address and reduce scan times with Nmap for large amounts of data.
Stars: ✭ 141 (-31.88%)
Nac bypassScript collection to bypass Network Access Control (NAC, 802.1x)
Stars: ✭ 79 (-61.84%)
StracciatellaOpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
Stars: ✭ 171 (-17.39%)
Sec ToolsDocker images for infosec tools
Stars: ✭ 135 (-34.78%)
Uac EscaperEscalation / Bypass Windows UAC
Stars: ✭ 72 (-65.22%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+460.39%)
AutoenumAutomatic Service Enumeration Script
Stars: ✭ 134 (-35.27%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-19.81%)
Awesome Internet ScanningA curated list of awesome Internet port and host scanners, plus related components and much more, with a focus on free and open source projects.
Stars: ✭ 130 (-37.2%)
Security ScriptsA collection of security related Python and Bash shell scripts. Analyze hosts on generic security vulnerabilities. Wrapper around popular tools like nmap (portscanner), nikto (webscanner) and testssl.sh (SSL/TLS scanner)
Stars: ✭ 188 (-9.18%)
Nwatch🔍 Tool for - Host Discovery, Port Scanning and Operating System Fingerprinting
Stars: ✭ 127 (-38.65%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-21.26%)
Nmap Cheatsheet📓 Reference guide for scanning networks with Nmap.
Stars: ✭ 124 (-40.1%)
DiscoverCustom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+1130.92%)
EternalviewEternalView is an all in one basic information gathering and vulnerability assessment tool
Stars: ✭ 118 (-43%)
Antimalware ResearchResearch on Anti-malware and other related security solutions
Stars: ✭ 163 (-21.26%)
BriaridsAn All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Stars: ✭ 187 (-9.66%)
Awesome Terminal CommandsAn awesome resource listing and explaining various commonly used *nix commands
Stars: ✭ 109 (-47.34%)
AxiomThe dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
Stars: ✭ 2,424 (+1071.01%)
NfrA lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (-49.76%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (-0.97%)
Suricata UpdateThe tool for updating your Suricata rules.
Stars: ✭ 143 (-30.92%)
Dynamite NsmDynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat detection
Stars: ✭ 92 (-55.56%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+1026.09%)
HumanoidNode.js package to bypass CloudFlare's anti-bot JavaScript challenges
Stars: ✭ 88 (-57.49%)
PsbypassclmBypass for PowerShell Constrained Language Mode
Stars: ✭ 138 (-33.33%)
AttUsing Asuswrt-Merlin to bypass AT&T's residential gateway
Stars: ✭ 79 (-61.84%)
UltimateapplockerbypasslistThe goal of this repository is to document the most common techniques to bypass AppLocker.
Stars: ✭ 1,186 (+472.95%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-34.3%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+470.05%)
SharesnifferNetwork share sniffer and auto-mounter for crawling remote file systems
Stars: ✭ 168 (-18.84%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+458.94%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+781.16%)
Cve 2020 16898CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
Stars: ✭ 207 (+0%)
Mysql Unsha1Authenticate against a MySQL server without knowing the cleartext password
Stars: ✭ 191 (-7.73%)