[go: up one dir, main page]

Search Results for "netbios enumeration tool"

Showing 38 open source projects for "netbios enumeration tool"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    OWASP Amass

    OWASP Amass

    In-depth attack surface mapping and asset discovery

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects ,tools, documents, forums, and chapters are free and open to anyone interested in improving application...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    Commando VM

    Commando VM

    Complete Mandiant Offensive VM (Commando VM)

    Commando VM (by Mandiant) is a Windows-based offensive security / red-team distribution built to turn a fresh Windows installation into a fully featured penetration testing environment. It provides an automated installer (PowerShell script) that uses Chocolatey, Boxstarter, and MyGet package feeds to download, install, and configure dozens (100+ / 170+ depending on version) of offensive, fuzzing, enumeration, and exploitation tools. The idea is to spare testers the repetitive work of hand...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    WPScan

    WPScan

    WPScan WordPress security scanner

    WPScan is a black-box WordPress vulnerability scanner written in Ruby. It analyzes WordPress sites to identify outdated core, plugins, themes, exposed APIs, and known vulnerabilities using a large built-in vulnerability database. It is a popular security auditing tool for pentesters and site administrators.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    HexStrike AI MCP Agents

    HexStrike AI MCP Agents

    HexStrike AI MCP Agents is an advanced MCP server

    HexStrike AI is an MCP server that lets LLM agents autonomously operate a large catalog of offensive-security tools. Its goal is to bridge “language models” and practical pentest workflows—enumeration, exploitation, vulnerability discovery, and bug bounty reconnaissance—under safe, auditable controls. The server exposes typed tools and guardrails so agent prompts translate to concrete, parameterized actions rather than brittle shell strings. It ships with curated tool adapters, task...
    Downloads: 11 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Th3inspector

    Th3inspector

    Best Tool For Information Gathering

    Th3Inspector is a Perl- and shell-based, all-in-one information-gathering toolkit built to quickly enumerate public and semi-public data about targets (domains, IPs, phone numbers, mail servers, etc.). It exposes a single command-line entrypoint (Th3inspector.pl) with many switches for common reconnaissance tasks — examples include website info, whois, MX lookup, geo-IP, subdomain discovery, CMS detection, port scanning, and Cloudflare real-IP resolution — so a user can chain many checks...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 6
    PowerSharpPack

    PowerSharpPack

    Offensive CSharp Projects wraped into Powershell for easy usage

    ... argument to pass tool-specific parameters. Included projects cover a broad range of post-exploitation and reconnaissance needs: Kerberos tooling, host survey utilities, credential and browser data extractors, AD enumeration, privilege escalation helpers, persistence frameworks, and file/handle utilities. For convenience the repo also ships per-binary PowerShell loaders when users prefer to avoid loading the entire pack, plus helper binaries used for compression/encoding.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    PrivescCheck

    PrivescCheck

    Privilege Escalation Enumeration Script for Windows

    PrivescCheck is a local privilege escalation reconnaissance tool for Unix-like systems that automates common checks auditors and system owners run when looking for misconfigurations. It enumerates kernel versions, installed packages, SUID/SGID binaries, world-writable files and directories, services, cron jobs, and user/group permissions to highlight likely escalation paths. The output is organized and human-readable so operators can triage findings quickly—flagging high-risk items separately...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    GOAD (Gather Open Attack Data) is a security reconnaissance framework for collecting, enriching, and visualizing open-source intelligence (OSINT) around hosts, domains, and certificates. It automates queries to certificate transparency logs, passive DNS, subdomain enumeration, web endpoints, and other public threat feeds. The tool aggregates results into structured formats and can produce interactive graphs to highlight relationships between entities (e.g. domain → IP → cert → ASN). Analysts...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Multi-functional tool for windows 10/11. able to debloat, configure repair or clean-up the operating system, view hardware/network info, reboot to windows recovery enviroment or UEFI firmware, and download other software in the blink of an eye
    Downloads: 11 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • 10
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    ... with Cisco switches: Catalyst: 2960,3560,3750,4948,6509,9200,9300,9500 (All protocols) Nexus: C9332C, 93180YC-EX (NX-OS SSH) Express 500 (HTTP) FYI: It uses Nbtscan.exe (NetBIOS) as a alternative method to discover the mac address of a host and now seems that it is considered a malware. Anyway it is just a simple network tool that can scan the network similar to NMAP or Angry IP Scanner, etc...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11

    dir-aka

    The Dir-aka Vulnerability Scanner is a Python-based security tool

    The Dir-aka Vulnerability Scanner is a Python-based security tool designed for cybersecurity professionals and system administrators to analyze and secure web servers against unauthorized access. This tool identifies sensitive files and folders on a target web server, filters content by file extensions, and highlights potential misconfigurations or vulnerabilities in publicly accessible directories. By scanning for directory indexing, probing for commonly targeted paths, and analyzing HTTP...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CrackMapExec

    CrackMapExec

    A swiss army knife for pentesting networks

    CrackMapExec (CME) is a versatile post-exploitation and enumeration tool designed for pentesters and red teams to assess Active Directory environments. It supports credential spraying, command execution, file transfers, and module-based extensions across SMB, RDP, LDAP, and other protocols. CME provides automation and insight into Windows networks and is commonly used during lateral movement and domain enumeration phases.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 13
    tabtoy

    tabtoy

    High performance tabular data exporter

    High-performance tabular data export tool. Support Xlsx/CSV as mixed input of tabular data. Support JSON/Golang/C#/Java/Lua/binary source, data, and type output. Automatic cell data format checking, accurate to cell errors. Support predefined enumeration can use Chinese enumeration type. Support table splitting, support multi-person collaboration. Support KV configuration table, convenient to use the table as a configuration file. Multi-core concurrent export, cache acceleration, export...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Linux Exploit Suggester 2

    Linux Exploit Suggester 2

    Next-Generation Linux Kernel Exploit Suggester

    Linux Exploit Suggester 2 is a next-generation enumeration tool that helps identify potential local privilege-escalation vectors on Linux systems. It inspects the target kernel and OS release, compares that information against a curated database of known kernel vulnerabilities, and reports which exploit primitives are plausibly applicable to the host. The script can optionally download exploit proof-of-concept code from public exploit repositories to accelerate validation in controlled...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    JDynamiTe, Dynamic Template in Java

    JDynamiTe, Dynamic Template in Java

    Dynamically generate documents from templates

    JDynamiTe is a tool which allows you to dynamically create documents in any format from "template" documents. And very few lines of code (or no line at all!) are needed to do that. Some typical usage domains of JDynamiTe are: - dynamic Web pages creation, - text document generation, - source code generation... In fact, it can be useful in any case where pre-defined documents (templates) have to be dynamically populated with data. The main benefit of JDynamiTe is to allow a true...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Sudomy

    Sudomy

    Sudomy is a subdomain enumeration tool to collect subdomains

    Sudomy is a subdomain enumeration tool to collect subdomains and analyze domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities. Easy, light, fast and powerful. Bash script (controller) is available by default in almost all Linux distributions. By using bash script multiprocessing feature, all processors will be utilized optimally. Subdomain enumeration process can be achieved by using active method or passive...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    WinPwn

    WinPwn

    Automation for internal Windows Penetrationtest / AD-Security

    WinPwn is a PowerShell-based toolkit for automating internal Windows penetration testing and Active Directory reconnaissance. It streamlines many manual steps by integrating reconnaissance modules like Seatbelt, Inveigh, Rubeus, and PrivescCheck. With proxy auto‑detection, endpoint enumeration, and exploitation routines, it's widely used in red team and blue team tool chains.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    AQUATONE

    AQUATONE

    A tool for domain flyovers

    .... This means that you can pretty much give it output of any tool you use for host discovery. Aquatone is now completely focused on screenshotting and reporting. I know a lot of people used Aquatone for its DNS enumeration capabilities and it was definitely very good at that when it was released. Now other tools are doing a much better job of this, so I decided to leave it out of the new Aquatone, and instead make it easy to use it with your tool of choice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    BootDebug

    A Debug style tool for OS Free systems

    BootDebug is kind of an odd ball tool. It boots up like an OS (using Grub) but is not really an OS at all. What it provides is a tool to look at the system in a very pure state, allowing you to see exactly what is going on at they very start of the system powering up.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PlantMAT
    Plant Metabolite Annotation Toolbox (PlantMAT) is a computational tool combining library search and combinatorial enumeration to facilitate the structural identification of plant specialized metabolites, e.g., saponins and flavonoid glycosides.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    XSPF Export Tool

    XSPF Export Tool

    copy files denoted in XSPF playlist to any location

    XSPF Export Tool loads an XSPF playlist (a "spiff" list), collects the music files denoted in the playlist from their locations, and then copies them to a single new location such as a folder or USB stick, portable device, network location, etc. Further, optional enumeration of output files is available. Don't forget to select the files from the list after the playlist loads using mouse or standard keyboard and mouse shortcuts such as CTRL+ A, CTRL+click, or SHIFT + click.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    NoSQLMap

    NoSQLMap

    Automated NoSQL database enumeration and web application exploitation

    A security tool for detecting and exploiting vulnerabilities in NoSQL databases, similar to SQLMap for traditional databases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    patchview - one addon to patchutils

    pacthview let us view parts of a patch

    patchview is one addon to patchutils, with this tool you can view, in a simplified way,only the sub-patches, that you want, of one (big) patch file. You can split patches.To simplify this, it makes the enumeration of the files and you can choose b Code is now available on github : https://github.com/sergiomb2/patchutils
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    HexaFind

    HexaFind

    HexaFind - The Unix & Linux network attack tool detection project.

    ... application have been created in response to these escalating movements towards network vulnerability enumeration and distributed denial of service attacks (DDoS). There is a clear lack of network attack tool detection products for the Linux/ UNIX operating system, and therefore this project should also address this imbalance. Within society, the UNIX / Linux operating system makes up an extremely minute fraction of operating systems that are in use within the world of today
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    SauceWalk Proxy Helper

    Enumeration and automation of file discovery for your sec tools.

    SauceWalk is a freeware(.exe)/Open Source(.py) tool for aiding in the enumeration of web application structure. It consists of 2 parts a local executable (walk.exe) and a remote agent. Walk.exe iterates through the local files and folders of your target web application (for example a local copy of Wordpress) and generates requests via your favourite proxy (for example burp suite) against a given target url. The remote agent can be used to identify target files and folders on a live system...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next