Search Results for "netbios enumeration tools"

Showing 39 open source projects for "netbios enumeration tools"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    reconFTW

    reconFTW

    Automated framework for domain reconnaissance and vulnerability scans.

    reconFTW is an open source automated reconnaissance framework created for security researchers, penetration testers, and bug bounty hunters. The tool streamlines the reconnaissance phase of security assessments by orchestrating numerous specialized tools to gather intelligence about a target domain. It performs multiple discovery and analysis tasks such as subdomain enumeration, OSINT collection, and vulnerability scanning in an automated workflow. The framework integrates many external security utilities and coordinates them to produce comprehensive reconnaissance results efficiently. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Commando VM

    Commando VM

    Complete Mandiant Offensive VM (Commando VM)

    ...It provides an automated installer (PowerShell script) that uses Chocolatey, Boxstarter, and MyGet package feeds to download, install, and configure dozens (100+ / 170+ depending on version) of offensive, fuzzing, enumeration, and exploitation tools. The idea is to spare testers the repetitive work of hand-installing dozens of windows tools, dependencies, and configurations. Commando VM supports customization of its installation profile (you can pick subsets of tools), includes support for WSL/Kali integration, and is intended to be used in a VM to facilitate snapshot recovery and test isolation.
    Downloads: 29 This Week
    Last Update:
    See Project
  • 3
    PowerSharpPack

    PowerSharpPack

    Offensive CSharp Projects wraped into Powershell for easy usage

    ...The author compiles, gzip-compresses and base64-encodes each C# binary, then dynamically loads the assemblies into the PowerShell process so operators can invoke powerful .NET tools without dropping executables on disk. The bundle exposes a single entry script (PowerSharpPack.ps1) with switches to select which embedded tool to run and an optional -Command argument to pass tool-specific parameters. Included projects cover a broad range of post-exploitation and reconnaissance needs: Kerberos tooling, host survey utilities, credential and browser data extractors, AD enumeration, privilege escalation helpers, persistence frameworks, and file/handle utilities. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    discover

    discover

    Automation framework for reconnaissance and penetration testing tasks

    Discover is a collection of custom Bash scripts designed to automate many common tasks involved in penetration testing workflows. The project brings together a variety of security testing functions into a single framework that simplifies reconnaissance, scanning, and enumeration processes. It provides a menu-driven interface that allows security professionals to quickly launch different tools and scripts without manually executing each command. The framework helps streamline activities such as information gathering, network scanning, and web application testing during security assessments. Discover also integrates with well-known security tools like Metasploit to generate malicious payloads and manage listeners for exploitation tasks. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    X-osint

    X-osint

    Open source OSINT tool for gathering data on emails, phones, and IPs

    ...It focuses on gathering useful and credible data about entities such as phone numbers, email addresses, and IP addresses using a range of automated OSINT techniques. It provides investigators and researchers with a centralized interface for running information-gathering tasks that would normally require multiple separate tools. X-osint can also perform domain-related reconnaissance activities such as subdomain enumeration, DNS lookups, and host discovery to help identify infrastructure associated with a target. In addition to network and domain intelligence, it includes features for extracting metadata from files or images and analyzing text content to uncover hidden details. ...
    Downloads: 21 This Week
    Last Update:
    See Project
  • 6
    Scope Sentry

    Scope Sentry

    Cyberspace asset mapping and vulnerability scanning platform

    ScopeSentry is an open source cybersecurity tool designed for cyberspace asset mapping and automated security analysis. It helps security researchers and penetration testers discover, monitor, and analyze internet-facing assets belonging to a target scope. ScopeSentry combines multiple reconnaissance and vulnerability assessment capabilities such as subdomain enumeration, port scanning, directory scanning, and sensitive information detection. ScopeSentry can automatically identify assets and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    HexStrike AI MCP Agents

    HexStrike AI MCP Agents

    HexStrike AI MCP Agents is an advanced MCP server

    HexStrike AI is an MCP server that lets LLM agents autonomously operate a large catalog of offensive-security tools. Its goal is to bridge “language models” and practical pentest workflows—enumeration, exploitation, vulnerability discovery, and bug bounty reconnaissance—under safe, auditable controls. The server exposes typed tools and guardrails so agent prompts translate to concrete, parameterized actions rather than brittle shell strings. It ships with curated tool adapters, task orchestration, and guidance for connecting popular agent clients (Claude, GPT, Copilot) to a hardened execution environment. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 8
    Raccoon

    Raccoon

    High-performance reconnaissance and vulnerability scanning tool

    ...The tool combines multiple scanning techniques into a single workflow, helping users identify potential weaknesses, exposed services, and accessible resources on a target host. Raccoon can perform DNS enumeration, subdomain discovery, and URL fuzzing to uncover hidden endpoints and infrastructure components. It also integrates network scanning capabilities through tools such as Nmap to detect open ports, services, and potential vulnerabilities. By consolidating these reconnaissance tasks into a single command-line interface, Raccoon aims to streamline the early phases of security testing and provide actionable information for further investigation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    FinalRecon

    FinalRecon

    All-in-one Python web reconnaissance tool for fast target analysis

    FinalRecon is an all-in-one web reconnaissance tool written in Python that helps security professionals gather information about a target website quickly and efficiently. It combines multiple reconnaissance techniques into a single command-line utility so users do not need to run several separate tools to collect similar data. FinalRecon focuses on providing a fast overview of a web target while maintaining accuracy in the collected results. It includes modules for gathering server...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Pacu

    Pacu

    The AWS exploitation framework, designed for testing security

    ...What used to take days to manually enumerate can be now be achieved in minutes. There are currently over 35 modules that range from reconnaissance, persistence, privilege escalation, enumeration, data exfiltration, log manipulation, and miscellaneous general exploitation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OWASP Amass

    OWASP Amass

    In-depth attack surface mapping and asset discovery

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects ,tools, documents, forums, and chapters are free and open to anyone interested in improving application...
    Downloads: 23 This Week
    Last Update:
    See Project
  • 12
    libwdi

    libwdi

    Windows Driver Installer library for USB devices

    libwdi is a cross-platform open-source C library focused on simplifying the installation of device drivers for USB hardware that otherwise does not have automatic driver support, making it especially useful for developers building installers or system management tools. The library abstracts away many of the complexities of USB device enumeration and driver deployment on Windows systems, such as creating a list of devices, preparing appropriate driver files, and invoking the operating system’s driver installation mechanics, so your software doesn’t have to re-implement these low-level tasks. It provides a clean API that includes functions to detect driverless USB devices, prepare driver packages, install drivers programmatically, and handle logging and error codes reliably. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 13
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    ...Integrations may include metadata like geolocation, WHOIS, and risk scoring to prioritize leads. GOAD helps teams transition from fragmented OSINT tools to a unified reconnaissance dashboard where exploration and filtering are first-class.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Sweeper
    Multi-functional tool for windows 10/11. able to debloat, configure repair or clean-up the operating system, view hardware/network info, reboot to windows recovery enviroment or UEFI firmware, and download other software in the blink of an eye
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    TraceMAC is a Windows/Linux command-line tool that allows you to trace a specific MAC address thru Cisco switches. It works by connecting to a switch using SSH, SNMP, Telnet, HTTP or HTTPS and do some "show commands" and later process the output, this will happen recursively until it finds the switch where that MAC address (PC/Printer/Etc) is directly connected. Note: It works with Cisco switches only and you must have CDP enabled at least on trunks/links between switches! Is tested...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    CrossLinked

    CrossLinked

    LinkedIn employee enumeration tool using search engine scraping

    CrossLinked is an open source LinkedIn enumeration tool designed to collect employee names associated with a target organization. Instead of accessing LinkedIn directly or relying on its API, it performs search engine scraping using services such as Google and Bing to discover public LinkedIn profile results. By analyzing these search results, CrossLinked extracts employee names and processes them into usable formats for security assessments or reconnaissance activities. This approach allows...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    HelloWord-Smart Keyboard

    HelloWord-Smart Keyboard

    High-end modular keyboard platform with deep customizability

    ...The project comprises a main keyboard PCB (STM32F103), a dynamic module (STM32F405) with additional features like an e-ink screen, OLED display and a haptic/motorized knob, a base/dock module with USB hub functionality, and other supporting PCBs. The firmware includes high-speed scanning of keystrokes, RGB lighting control via SPI/DMA, HID keyboard enumeration, multiple key-layer mapping and non-volatile configuration storage. The hardware architecture is modular: the keyboard, dynamic module, and base connect via FFC/contacts so you can swap out the dynamic side module or bottom. The documentation includes 3D models for casing, firmware binaries, and tools for customization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    OneForAll

    OneForAll

    OneForAll is a powerful subdomain collection tool

    OneForAll is a comprehensive subdomain enumeration and reconnaissance tool primarily used in penetration testing and bug bounty workflows. Built in Python, it aggregates results from numerous DNS, certificate transparency, search engine, and threat intelligence sources to uncover hidden subdomains. The tool is particularly notable for incorporating many Chinese data sources that are often missed by Western-focused recon tools, increasing discovery coverage.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    tabtoy

    tabtoy

    High performance tabular data exporter

    ...Binary merge export (5th generation exporter requires 2 tools to complete). For performance reasons, the C# source code reads the tabtoy-specific binary format by default.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Hakrawler

    Hakrawler

    Fast Go web crawler for discovering URLs and web app endpoints

    ...It works by automatically crawling web pages and extracting links, JavaScript file locations, and other resources that may reveal additional attack surface or hidden functionality. hakrawler is implemented as a simple and efficient crawler using the Gocolly library, which allows it to perform fast and concurrent crawling of web pages. It accepts URLs through standard input, making it easy to integrate into command-line pipelines with other security tools. This workflow enables researchers to combine it with subdomain enumeration, HTTP probing, and vulnerability scanning utilities to automate reconnaissance processes. hakrawler can follow links within a website and optionally include subdomains.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Apophysis AV

    Apophysis AV

    Fractal Flame Editor

    Apophysis AV is an improved and modern version of the famous fractal flame editor Apophysis. This application combines the best options of previous branches (e.g. 3D- or 64-bit support and favourite variations), some of which were lost in the development process, and has multiple bugfixes. Besides, Apophysis AV has a lot of new features.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 22
    Blackbone

    Blackbone

    Windows memory hacking library

    Blackbone is a powerful Windows-focused memory manipulation and process interaction library intended for developers needing deep access to system internals, reverse engineering, or dynamic analysis tools. It provides a comprehensive API in C++ that allows allocation and management of virtual memory in local and remote processes, reading and writing remote process memory, enumerating loaded modules, creating and controlling threads, and performing complex pattern searches—all with support for...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    libsurvive

    libsurvive

    Open Source Lighthouse Tracking System

    Libsurvive is a set of tools and libraries that enable 6 dof tracking on lighthouse and vive-based systems that is completely open source and can run on any device. It currently supports both SteamVR 1.0 and SteamVR 2.0 generation of devices and should support any tracked object commercially available.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Linux Exploit Suggester 2

    Linux Exploit Suggester 2

    Next-Generation Linux Kernel Exploit Suggester

    Linux Exploit Suggester 2 is a next-generation enumeration tool that helps identify potential local privilege-escalation vectors on Linux systems. It inspects the target kernel and OS release, compares that information against a curated database of known kernel vulnerabilities, and reports which exploit primitives are plausibly applicable to the host. The script can optionally download exploit proof-of-concept code from public exploit repositories to accelerate validation in controlled...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    enum4linux

    enum4linux

    enum4Linux is a Linux alternative to enum.exe for enumerating data

    enum4linux is a Unix-friendly enumeration utility that extracts information from Windows and Samba hosts over SMB, aiding both penetration testers and defenders. It drives standard tools under the hood to query for user and group lists, share exports, password policy settings, OS details, and RID cycling—often even via null sessions when allowed. Output is organized and grep-able, making it easy to pivot quickly from discovery to targeted probing or remediation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB