| ivre/ivre |
3,167 |
|
0 |
0 |
over 2 years ago |
0 |
|
43 |
gpl-3.0 |
Python |
| Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, etc. |
| nmap/ncrack |
927 |
|
0 |
0 |
about 3 years ago |
1 |
February 27, 2018 |
59 |
other |
C |
| Ncrack network authentication tool |
| Ullaakut/nmap |
839 |
|
0 |
13 |
over 2 years ago |
13 |
October 11, 2022 |
11 |
mit |
Go |
| Idiomatic nmap library for go developers |
| s0md3v/Silver |
768 |
|
0 |
0 |
about 4 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| Mass scan IPs for vulnerable services |
| m0nad/HellRaiser |
545 |
|
0 |
0 |
about 3 years ago |
0 |
|
16 |
|
Ruby |
| Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs. |
| evait-security/envizon |
519 |
|
0 |
0 |
almost 3 years ago |
0 |
|
2 |
mit |
Ruby |
| network visualization & pentest reporting |
| nullt3r/jfscan |
407 |
|
0 |
0 |
about 3 years ago |
0 |
|
1 |
mit |
Python |
| JF⚡can - Super fast port scanning & service discovery using Masscan and Nmap. Scan large networks with Masscan and use Nmap's scripting abilities to discover information about services. Generate report. |
| GinjaChris/pentmenu |
382 |
|
0 |
0 |
almost 4 years ago |
0 |
|
5 |
gpl-3.0 |
Shell |
| A bash script for recon and DOS attacks |
| delvelabs/batea |
239 |
|
0 |
0 |
about 4 years ago |
0 |
|
2 |
gpl-2.0 |
Python |
| AI-based, context-driven network device ranking |
| welchbj/bscan |
195 |
|
0 |
0 |
about 6 years ago |
10 |
February 11, 2019 |
2 |
mit |
Python |
| an asynchronous target enumeration tool |