badKarma
Network scanner
A tool designed to assist penetration testers during network assessments by gathering and analyzing network information.
network reconnaissance toolkit
419 stars
20 watching
93 forks
Language: Python
last commit: about 6 years ago hackinginformation-gatheringkali-linuxmasscannetwork-securitynmapoffensive-securitypenetration-testingpentest-toolpython3reconnaissancesecurity-auditshodan
Related projects:
Repository | Description | Stars |
---|---|---|
| A network reconnaissance tool leveraging Nmap's capabilities to automate and speed up scanning. | 1,586 |
| Automated network vulnerability scanning and reconnaissance tool | 433 |
| A terminal-based network scanning and diagnostic tool with advanced features like packet analysis and filtering. | 886 |
| A tool for quickly scanning local network hosts using the ARP protocol | 92 |
| A tool for performing reconnaissance of networks and assets by discovering and scanning them | 34 |
| Scans networks to identify vulnerabilities by correlating CPEs with CVEs using an API | 562 |
| An open-source tool for analyzing network device configurations and identifying security configuration weaknesses. | 68 |
| A tool that detects compromised machines by exploiting the lack of LLMNR name resolution in non-adversarial networks. | 316 |
| A high-performance network scanning and service discovery tool with support for multiple platforms and tools | 1,567 |
| Automates network vulnerability scanning using SMB protocol | 140 |
| A tool for crafting and analyzing network packets and pcap files to support security research and testing. | 869 |
| Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. | 2,124 |
| A platform for continuous network scanning and data review using nmap and Elasticsearch. | 626 |
| A fast network scanner with IPv6 capabilities that can perform various types of scans and send probes. | 108 |
| An attack surface management platform that automates the discovery of hidden assets and vulnerabilities in computer environments. | 8,190 |