[go: up one dir, main page]

Search Results for "netbios enumeration tool"

Showing 38 open source projects for "netbios enumeration tool"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • The Ultimate Employee Recognition and Rewards Program Icon
    The Ultimate Employee Recognition and Rewards Program

    Motivating employees to grow, thrive, and be more productive.

    The Bucketlist platform makes it easy and fun for employees and managers to recognize and reward one another for milestones, achievements, and a job well done. It's so easy as it integrates with the programs you already use every day. Unlike any other recognition program, Bucketlist enables companies to reward employees exactly the way they want, resulting in a 97% product satisfaction score. There are thousands of rewards to choose from, plus you can add custom rewards to suit your company.
    Free Trial
  • 1
    WPScan

    WPScan

    WPScan WordPress security scanner

    WPScan is a black-box WordPress vulnerability scanner written in Ruby. It analyzes WordPress sites to identify outdated core, plugins, themes, exposed APIs, and known vulnerabilities using a large built-in vulnerability database. It is a popular security auditing tool for pentesters and site administrators.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    PowerSharpPack

    PowerSharpPack

    Offensive CSharp Projects wraped into Powershell for easy usage

    ...The author compiles, gzip-compresses and base64-encodes each C# binary, then dynamically loads the assemblies into the PowerShell process so operators can invoke powerful .NET tools without dropping executables on disk. The bundle exposes a single entry script (PowerSharpPack.ps1) with switches to select which embedded tool to run and an optional -Command argument to pass tool-specific parameters. Included projects cover a broad range of post-exploitation and reconnaissance needs: Kerberos tooling, host survey utilities, credential and browser data extractors, AD enumeration, privilege escalation helpers, persistence frameworks, and file/handle utilities. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    OWASP Amass

    OWASP Amass

    In-depth attack surface mapping and asset discovery

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects ,tools, documents, forums, and chapters are free and open to anyone interested in improving application...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 4
    HexStrike AI MCP Agents

    HexStrike AI MCP Agents

    HexStrike AI MCP Agents is an advanced MCP server

    HexStrike AI is an MCP server that lets LLM agents autonomously operate a large catalog of offensive-security tools. Its goal is to bridge “language models” and practical pentest workflows—enumeration, exploitation, vulnerability discovery, and bug bounty reconnaissance—under safe, auditable controls. The server exposes typed tools and guardrails so agent prompts translate to concrete, parameterized actions rather than brittle shell strings. It ships with curated tool adapters, task orchestration, and guidance for connecting popular agent clients (Claude, GPT, Copilot) to a hardened execution environment. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Best Visitor Management System Icon
    Best Visitor Management System

    Instantly Notify Staff Of Deliveries And Guest Arrivals To Increase Your Efficiency

    <p class="mb-4">Do stacks of paperwork pile up at the front desk area? Or are your receptionists constantly filing reports, guest log-in information and NDAs – taking them away from other important tasks? Not anymore! Our Visitor Management System automates all these processes, streamlining your workflow. Guests can complete inductions, sign NDAs, fill in their contact details and much more using the easy software. These records are then automatically filed and stored, making life easy for receptionists and the HR team. Claim your FREE 7-day trial and experience how VisitUs can transform your workplace!</p>
    Try it Free
  • 5
    PrivescCheck

    PrivescCheck

    Privilege Escalation Enumeration Script for Windows

    PrivescCheck is a local privilege escalation reconnaissance tool for Unix-like systems that automates common checks auditors and system owners run when looking for misconfigurations. It enumerates kernel versions, installed packages, SUID/SGID binaries, world-writable files and directories, services, cron jobs, and user/group permissions to highlight likely escalation paths. The output is organized and human-readable so operators can triage findings quickly—flagging high-risk items...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    Commando VM

    Commando VM

    Complete Mandiant Offensive VM (Commando VM)

    Commando VM (by Mandiant) is a Windows-based offensive security / red-team distribution built to turn a fresh Windows installation into a fully featured penetration testing environment. It provides an automated installer (PowerShell script) that uses Chocolatey, Boxstarter, and MyGet package feeds to download, install, and configure dozens (100+ / 170+ depending on version) of offensive, fuzzing, enumeration, and exploitation tools. The idea is to spare testers the repetitive work of...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    GOAD (Gather Open Attack Data) is a security reconnaissance framework for collecting, enriching, and visualizing open-source intelligence (OSINT) around hosts, domains, and certificates. It automates queries to certificate transparency logs, passive DNS, subdomain enumeration, web endpoints, and other public threat feeds. The tool aggregates results into structured formats and can produce interactive graphs to highlight relationships between entities (e.g. domain → IP → cert → ASN). Analysts can filter, cluster, and explore these relationships to identify infrastructure patterns, potential subdomains, or attack surfaces. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Th3inspector

    Th3inspector

    Best Tool For Information Gathering

    Th3Inspector is a Perl- and shell-based, all-in-one information-gathering toolkit built to quickly enumerate public and semi-public data about targets (domains, IPs, phone numbers, mail servers, etc.). It exposes a single command-line entrypoint (Th3inspector.pl) with many switches for common reconnaissance tasks — examples include website info, whois, MX lookup, geo-IP, subdomain discovery, CMS detection, port scanning, and Cloudflare real-IP resolution — so a user can chain many checks...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    dir-aka

    The Dir-aka Vulnerability Scanner is a Python-based security tool

    The Dir-aka Vulnerability Scanner is a Python-based security tool designed for cybersecurity professionals and system administrators to analyze and secure web servers against unauthorized access. This tool identifies sensitive files and folders on a target web server, filters content by file extensions, and highlights potential misconfigurations or vulnerabilities in publicly accessible directories.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free Website Monitoring Service | UptimeRobot Icon
    Free Website Monitoring Service | UptimeRobot

    The free online uptime monitoring service with an App is available for iOS and Android.

    With the Free Plan, you can monitor up to 50 URLs, check for a website's content (using the keyword monitor), ping your server or monitor your ports in 5-minute intervals. You can create a status page to showcase your uptime. SMS or Call alerts can be bought anytime.
    Learn More
  • 10
    Sweeper
    Multi-functional tool for windows 10/11. able to debloat, configure repair or clean-up the operating system, view hardware/network info, reboot to windows recovery enviroment or UEFI firmware, and download other software in the blink of an eye
    Downloads: 18 This Week
    Last Update:
    See Project
  • 11
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    ...Is tested with Cisco switches: Catalyst: 2960,3560,3750,4948,6509,9200,9300,9500 (All protocols) Nexus: C9332C, 93180YC-EX (NX-OS SSH) Express 500 (HTTP) FYI: It uses Nbtscan.exe (NetBIOS) as a alternative method to discover the mac address of a host and now seems that it is considered a malware. Anyway it is just a simple network tool that can scan the network similar to NMAP or Angry IP Scanner, etc...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    CrackMapExec

    CrackMapExec

    A swiss army knife for pentesting networks

    CrackMapExec (CME) is a versatile post-exploitation and enumeration tool designed for pentesters and red teams to assess Active Directory environments. It supports credential spraying, command execution, file transfers, and module-based extensions across SMB, RDP, LDAP, and other protocols. CME provides automation and insight into Windows networks and is commonly used during lateral movement and domain enumeration phases.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 13
    tabtoy

    tabtoy

    High performance tabular data exporter

    High-performance tabular data export tool. Support Xlsx/CSV as mixed input of tabular data. Support JSON/Golang/C#/Java/Lua/binary source, data, and type output. Automatic cell data format checking, accurate to cell errors. Support predefined enumeration can use Chinese enumeration type. Support table splitting, support multi-person collaboration. Support KV configuration table, convenient to use the table as a configuration file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Linux Exploit Suggester 2

    Linux Exploit Suggester 2

    Next-Generation Linux Kernel Exploit Suggester

    Linux Exploit Suggester 2 is a next-generation enumeration tool that helps identify potential local privilege-escalation vectors on Linux systems. It inspects the target kernel and OS release, compares that information against a curated database of known kernel vulnerabilities, and reports which exploit primitives are plausibly applicable to the host. The script can optionally download exploit proof-of-concept code from public exploit repositories to accelerate validation in controlled environments. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    JDynamiTe, Dynamic Template in Java

    JDynamiTe, Dynamic Template in Java

    Dynamically generate documents from templates

    JDynamiTe is a tool which allows you to dynamically create documents in any format from "template" documents. And very few lines of code (or no line at all!) are needed to do that. Some typical usage domains of JDynamiTe are: - dynamic Web pages creation, - text document generation, - source code generation... In fact, it can be useful in any case where pre-defined documents (templates) have to be dynamically populated with data. The main benefit of JDynamiTe is to allow a true...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Sudomy

    Sudomy

    Sudomy is a subdomain enumeration tool to collect subdomains

    Sudomy is a subdomain enumeration tool to collect subdomains and analyze domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities. Easy, light, fast and powerful. Bash script (controller) is available by default in almost all Linux distributions. By using bash script multiprocessing feature, all processors will be utilized optimally.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    WinPwn

    WinPwn

    Automation for internal Windows Penetrationtest / AD-Security

    WinPwn is a PowerShell-based toolkit for automating internal Windows penetration testing and Active Directory reconnaissance. It streamlines many manual steps by integrating reconnaissance modules like Seatbelt, Inveigh, Rubeus, and PrivescCheck. With proxy auto‑detection, endpoint enumeration, and exploitation routines, it's widely used in red team and blue team tool chains.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    AQUATONE

    AQUATONE

    A tool for domain flyovers

    ...It doesn't really care how the piped data looks as URLs, domains, and IP addresses will be extracted with regular expression pattern matching. This means that you can pretty much give it output of any tool you use for host discovery. Aquatone is now completely focused on screenshotting and reporting. I know a lot of people used Aquatone for its DNS enumeration capabilities and it was definitely very good at that when it was released. Now other tools are doing a much better job of this, so I decided to leave it out of the new Aquatone, and instead make it easy to use it with your tool of choice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    BootDebug

    A Debug style tool for OS Free systems

    BootDebug is kind of an odd ball tool. It boots up like an OS (using Grub) but is not really an OS at all. What it provides is a tool to look at the system in a very pure state, allowing you to see exactly what is going on at they very start of the system powering up.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PlantMAT
    Plant Metabolite Annotation Toolbox (PlantMAT) is a computational tool combining library search and combinatorial enumeration to facilitate the structural identification of plant specialized metabolites, e.g., saponins and flavonoid glycosides.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    XSPF Export Tool

    XSPF Export Tool

    copy files denoted in XSPF playlist to any location

    XSPF Export Tool loads an XSPF playlist (a "spiff" list), collects the music files denoted in the playlist from their locations, and then copies them to a single new location such as a folder or USB stick, portable device, network location, etc. Further, optional enumeration of output files is available. Don't forget to select the files from the list after the playlist loads using mouse or standard keyboard and mouse shortcuts such as CTRL+ A, CTRL+click, or SHIFT + click.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    NoSQLMap

    NoSQLMap

    Automated NoSQL database enumeration and web application exploitation

    A security tool for detecting and exploiting vulnerabilities in NoSQL databases, similar to SQLMap for traditional databases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    patchview - one addon to patchutils

    pacthview let us view parts of a patch

    patchview is one addon to patchutils, with this tool you can view, in a simplified way,only the sub-patches, that you want, of one (big) patch file. You can split patches.To simplify this, it makes the enumeration of the files and you can choose b Code is now available on github : https://github.com/sergiomb2/patchutils
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    HexaFind

    HexaFind

    HexaFind - The Unix & Linux network attack tool detection project.

    ...In order to defend against threats – security is not only required in a pre-emptive scenario, but also ex post facto; whereby the criminal/ civil act has been detected and the acquisition of evidence has begun in order to provide a conviction. This project and its scripted application have been created in response to these escalating movements towards network vulnerability enumeration and distributed denial of service attacks (DDoS). There is a clear lack of network attack tool detection products for the Linux/ UNIX operating system, and therefore this project should also address this imbalance. Within society, the UNIX / Linux operating system makes up an extremely minute fraction of operating systems that are in use within the world of today
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    SauceWalk Proxy Helper

    Enumeration and automation of file discovery for your sec tools.

    SauceWalk is a freeware(.exe)/Open Source(.py) tool for aiding in the enumeration of web application structure. It consists of 2 parts a local executable (walk.exe) and a remote agent. Walk.exe iterates through the local files and folders of your target web application (for example a local copy of Wordpress) and generates requests via your favourite proxy (for example burp suite) against a given target url.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next