🖖Vulnerability Analysis

yersinia -G
oscanner -s 192.168.1.15 -P 1040
  • trity watch

trity
doona -m HTTP -t 192.168.1.15 -M 5
lynis -h
CAT
cge.pl
cisco-ocs
cisco-ocs 192.168.99.200 192.168.99.202
  • cisco-ocr watch

cisco-ocr
cisco-torch -A 10.1.1.0/24
copy-router-config.pl
merge-router-config.pl
bed -s HTTP -t 192.168.1.15
ohrwurm
sfuzz -h
spike-generic_chunked
spike-generic_listen_tcp
spike-generic_send_tcp
spike-generic_send_udp
dhcpig
iaxflood 192.168.1.202 192.168.1.1 500
inviteflood eth0 5000 example.local 192.168.1.5 100
siege example.com
t50 -h
t50 --flood 192.168.1.1
 
thc-ssl-dos -l 100 192.168.1.208 443 --accept
ace -i eth0 -m 00:1E:F7:28:9C:8e
ace -r eth0.96
enumiax -d /usr/share/wordlists/metasploit/unix_users.txt 192.168.1.1
protos-sip -h
rtpbreak -i eth0 -g -m -d rtplog
rtpflood -h
rtpinsertsound -h
rtpmixsound -h
sctpscan -s -F -r 192.168.1.*
sipp
svcrack -h
svreport -h
svmap -h
svwar -h
voiphopper -i eth0 -z
unix-privesc-check standard

Last updated

Was this helpful?