Nmap commands

TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254 -iL <inputfilename>: Input from list of hosts/networks -iR <num hosts>: Choose random targets –exclude <host1[,host2][,host3],…>: Exclude hosts/networks –excludefile <exclude_file>: Exclude list from file   HOST DISCOVERY:

Read more

shadowbroker

shadowbroker They published several leaks of some of the National Security Agency (NSA) hacking tools including zero-day exploits Specifically, exploits and vulnerabilities targeting enterprise firewalls, anti-virus products and Microsoft products, tied to the Equation Group threat actor, NSA’s Tailored Access

Read more

AppSec Tools

  Faraday Faraday’s pentest environment, which recently ranked #6 on the top security tools list by ToolsWatch.org, offers a new way to perform pentesting – in an IDE. The tool is built for the analysis, indexation and distribution of the

Read more

Pin It on Pinterest