[go: up one dir, main page]

Search Results for "netbios enumeration tool"

Showing 26 open source projects for "netbios enumeration tool"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    HexStrike AI MCP Agents

    HexStrike AI MCP Agents

    HexStrike AI MCP Agents is an advanced MCP server

    HexStrike AI is an MCP server that lets LLM agents autonomously operate a large catalog of offensive-security tools. Its goal is to bridge “language models” and practical pentest workflows—enumeration, exploitation, vulnerability discovery, and bug bounty reconnaissance—under safe, auditable controls. The server exposes typed tools and guardrails so agent prompts translate to concrete, parameterized actions rather than brittle shell strings. It ships with curated tool adapters, task...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 2
    WPScan

    WPScan

    WPScan WordPress security scanner

    WPScan is a black-box WordPress vulnerability scanner written in Ruby. It analyzes WordPress sites to identify outdated core, plugins, themes, exposed APIs, and known vulnerabilities using a large built-in vulnerability database. It is a popular security auditing tool for pentesters and site administrators.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    Th3inspector

    Th3inspector

    Best Tool For Information Gathering

    Th3Inspector is a Perl- and shell-based, all-in-one information-gathering toolkit built to quickly enumerate public and semi-public data about targets (domains, IPs, phone numbers, mail servers, etc.). It exposes a single command-line entrypoint (Th3inspector.pl) with many switches for common reconnaissance tasks — examples include website info, whois, MX lookup, geo-IP, subdomain discovery, CMS detection, port scanning, and Cloudflare real-IP resolution — so a user can chain many checks...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    Multi-functional tool for windows 10/11. able to debloat, configure repair or clean-up the operating system, view hardware/network info, reboot to windows recovery enviroment or UEFI firmware, and download other software in the blink of an eye
    Downloads: 9 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    ... with Cisco switches: Catalyst: 2960,3560,3750,4948,6509,9200,9300,9500 (All protocols) Nexus: C9332C, 93180YC-EX (NX-OS SSH) Express 500 (HTTP) FYI: It uses Nbtscan.exe (NetBIOS) as a alternative method to discover the mac address of a host and now seems that it is considered a malware. Anyway it is just a simple network tool that can scan the network similar to NMAP or Angry IP Scanner, etc...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6

    dir-aka

    The Dir-aka Vulnerability Scanner is a Python-based security tool

    The Dir-aka Vulnerability Scanner is a Python-based security tool designed for cybersecurity professionals and system administrators to analyze and secure web servers against unauthorized access. This tool identifies sensitive files and folders on a target web server, filters content by file extensions, and highlights potential misconfigurations or vulnerabilities in publicly accessible directories. By scanning for directory indexing, probing for commonly targeted paths, and analyzing HTTP...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    CrackMapExec

    CrackMapExec

    A swiss army knife for pentesting networks

    CrackMapExec (CME) is a versatile post-exploitation and enumeration tool designed for pentesters and red teams to assess Active Directory environments. It supports credential spraying, command execution, file transfers, and module-based extensions across SMB, RDP, LDAP, and other protocols. CME provides automation and insight into Windows networks and is commonly used during lateral movement and domain enumeration phases.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 8
    tabtoy

    tabtoy

    High performance tabular data exporter

    High-performance tabular data export tool. Support Xlsx/CSV as mixed input of tabular data. Support JSON/Golang/C#/Java/Lua/binary source, data, and type output. Automatic cell data format checking, accurate to cell errors. Support predefined enumeration can use Chinese enumeration type. Support table splitting, support multi-person collaboration. Support KV configuration table, convenient to use the table as a configuration file. Multi-core concurrent export, cache acceleration, export...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Linux Exploit Suggester 2

    Linux Exploit Suggester 2

    Next-Generation Linux Kernel Exploit Suggester

    Linux Exploit Suggester 2 is a next-generation enumeration tool that helps identify potential local privilege-escalation vectors on Linux systems. It inspects the target kernel and OS release, compares that information against a curated database of known kernel vulnerabilities, and reports which exploit primitives are plausibly applicable to the host. The script can optionally download exploit proof-of-concept code from public exploit repositories to accelerate validation in controlled...
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-based, Comprehensive Service Management for Businesses and IT Providers Icon
    AI-based, Comprehensive Service Management for Businesses and IT Providers

    Modular solutions for change management, asset management and more

    ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
    Learn More
  • 10
    JDynamiTe, Dynamic Template in Java

    JDynamiTe, Dynamic Template in Java

    Dynamically generate documents from templates

    JDynamiTe is a tool which allows you to dynamically create documents in any format from "template" documents. And very few lines of code (or no line at all!) are needed to do that. Some typical usage domains of JDynamiTe are: - dynamic Web pages creation, - text document generation, - source code generation... In fact, it can be useful in any case where pre-defined documents (templates) have to be dynamically populated with data. The main benefit of JDynamiTe is to allow a true...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Sudomy

    Sudomy

    Sudomy is a subdomain enumeration tool to collect subdomains

    Sudomy is a subdomain enumeration tool to collect subdomains and analyze domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities. Easy, light, fast and powerful. Bash script (controller) is available by default in almost all Linux distributions. By using bash script multiprocessing feature, all processors will be utilized optimally. Subdomain enumeration process can be achieved by using active method or passive...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    AQUATONE

    AQUATONE

    A tool for domain flyovers

    .... This means that you can pretty much give it output of any tool you use for host discovery. Aquatone is now completely focused on screenshotting and reporting. I know a lot of people used Aquatone for its DNS enumeration capabilities and it was definitely very good at that when it was released. Now other tools are doing a much better job of this, so I decided to leave it out of the new Aquatone, and instead make it easy to use it with your tool of choice.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    PlantMAT
    Plant Metabolite Annotation Toolbox (PlantMAT) is a computational tool combining library search and combinatorial enumeration to facilitate the structural identification of plant specialized metabolites, e.g., saponins and flavonoid glycosides.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    NoSQLMap

    NoSQLMap

    Automated NoSQL database enumeration and web application exploitation

    A security tool for detecting and exploiting vulnerabilities in NoSQL databases, similar to SQLMap for traditional databases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    patchview - one addon to patchutils

    pacthview let us view parts of a patch

    patchview is one addon to patchutils, with this tool you can view, in a simplified way,only the sub-patches, that you want, of one (big) patch file. You can split patches.To simplify this, it makes the enumeration of the files and you can choose b Code is now available on github : https://github.com/sergiomb2/patchutils
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    HexaFind

    HexaFind

    HexaFind - The Unix & Linux network attack tool detection project.

    ... application have been created in response to these escalating movements towards network vulnerability enumeration and distributed denial of service attacks (DDoS). There is a clear lack of network attack tool detection products for the Linux/ UNIX operating system, and therefore this project should also address this imbalance. Within society, the UNIX / Linux operating system makes up an extremely minute fraction of operating systems that are in use within the world of today
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    SauceWalk Proxy Helper

    Enumeration and automation of file discovery for your sec tools.

    SauceWalk is a freeware(.exe)/Open Source(.py) tool for aiding in the enumeration of web application structure. It consists of 2 parts a local executable (walk.exe) and a remote agent. Walk.exe iterates through the local files and folders of your target web application (for example a local copy of Wordpress) and generates requests via your favourite proxy (for example burp suite) against a given target url. The remote agent can be used to identify target files and folders on a live system...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    RAWR - Rapid Assessment of Web Resources

    A web interface enumeration tool for simplifying red team reporting.

    Introducing RAWR (Rapid Assessment of Web Resources). There's a lot packed in this tool that will help you get a better grasp of the threat landscape that is your client's web resources. It has been tested from extremely large network environments, down to 5 node networks. It has been fine-tuned to promote fast, accurate, and applicable results in usable formats. RAWR will make the mapping phase of your next web assessment efficient and get you producing positive results faster!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    mySQLenum is a command line automatic blind sql injection tool for web application that uses MySql server as its back-end. Its main goal is to provide an easy to use command line interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Black scalpel is an advanced graphical (Swing gui) security and analysis tool written in Java, C and Assembler (platform independent). Current stage is early alpha, many features are still missing. Use SVN!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A Java Hijacking tool for web application session security assessment. A simple Java Fuzzer that can mainly be used for numeric session hijacking and parameter enumeration. Demonstration video is also available.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 22
    NBTscan-Ipanto is a command-line tool that scans for NETBIOS devices on a local or remote TCP/IP network. NBTscan-Ipanto is more powerful than others NETBIOS scanners as it is designed not to flood ARP tables and firewalls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Exploits some of the known vulnerabilities of Oracle. Includes SID Enumeration, Passwords tests [common/ dictionary]. Supports attachment of malformed shell codes with TCP packets for crashing the remote server or gain DBA privileges on it.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    A mail reporting and enumeration tool in the style of biff/buffy/xbuffy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next