udp-hunter: Network assessment tool for various UDP Services
What is UDP Hunter? UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top of UDP, the tool choices get pretty limited. UDP...
What is UDP Hunter? UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top of UDP, the tool choices get pretty limited. UDP...
Information Gathering / Web Information Gathering
by do son · Published June 6, 2020 · Last modified October 11, 2021
Shodanfy.py Get ports, vulnerabilities, information, banners,..etc for any IP with Shodan (no apikey! no rate limit!) Download git clone https://github.com/m4ll0k/Shodanfy.py.git Use python3 shodanfy.py Usage: python3 shodanfy.py <ip> [OPTIONS] –stdin Get...
Inou Inou (pronounced as “I know you”) is a tool to discover the service behind a specific unknown port. It performs an active scan trying to communicate with the service...
Forerunner The Forerunner library is a fast, lightweight, and extensible networking library created to aid in the development of robust network-centric applications such as IP Scanners, Port Knockers, Clients, Servers,...
Information Gathering / Web Information Gathering
by do son · Published April 19, 2020 · Last modified October 25, 2022
RedRabbit RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam. The aim is to highlight just how Powerful PowerShell is and how it can be used...
WEASEL: A Stealthy DNS Beacon WEASEL is a small in-memory implant using Python 3 with no dependencies. The beacon client sends a small amount of identifying information about its host...
Information Gathering / Password Attacks
by do son · Published March 24, 2020 · Last modified March 5, 2021
jackdaw Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice graphs on how your domain objects interact with each-other...
Eavesarp A reconnaissance tool that analyzes ARP requests to identify hosts that are likely communicating with one another, which is useful in those dreaded situations where LLMNR/NBNS aren’t in use...
Information Gathering / Vulnerability Analysis
by do son · Published March 4, 2020 · Last modified October 25, 2022
Pulsar Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. It’s focused on the discovery of organization public-facing assets with minimal knowledge about its infrastructure....
NTLMRecon A fast NTLM reconnaissance tool without external dependencies. Useful to find out information about NTLM endpoints when working with a large set of potential IP addresses and domains. NTLMRecon...
SharpSniper Often a Red Team engagement is more than just achieving Domain Admin. Some clients will want to see if specific users in the domain can be compromised, for example,...
Information Gathering / Vulnerability Analysis
by do son · Published February 4, 2020 · Last modified October 11, 2023
naabu naabu is a fast port scanner tool written in Go that allows you to enumerate valid ports for hosts in a fast and reliable manner. It is a really...
Recon-AD, an AD recon tool based on ADSI and reflective DLL’s New monitoring and defense optics are being applied within Microsoft operating systems and security products. This should help defenders...
Information Gathering / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis
by do son · Published January 23, 2020 · Last modified February 6, 2022
nray Nray is a free, platform and architecture-independent port and application layer scanner. Apart from regular targets (list of hosts/networks), it supports dynamic target selection, based on sources like certificate...
IPv6Tools The IPv6Tools framework is a robust set of modules and plugins that allow a user to audit an IPv6 enabled network. The built-in modules support enumeration of IPv6 features...