The Network Execution Tool
-
Updated
Nov 13, 2025 - Python
The Network Execution Tool
🔓 🔓 Find secrets and passwords in container images and file systems 🔓 🔓
⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
⭐ ⭐ Use ML to classify flows and packets as benign or malicious. ⭐ ⭐
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Metlo is an open-source API security platform.
Little Bug Bounty & Hacking Tools⚔️
Tools & Resources for Cyber Security Operations
Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highlighting those that contain matches.
Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated daily. Showcased at BlackHat Europe 2025 Arsenal.
ServiceNow widge-simple-list misconfiguration scanner
Filter and enrich a list of subdomains by level
This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Generate tens of thousands of subdomain combinations in a matter of seconds
Execute commands interactively on remote Windows machines using the WinRM protocol
Add a description, image, and links to the infosectools topic page so that developers can more easily learn about it.
To associate your repository with the infosectools topic, visit your repo's landing page and select "manage topics."