nmap -sV --script=banner target
Alert! To view more content, click the description below a terminal command.
nmap -sV --script=banner target
ip a s
host google.com
nslookup google.com
dnsrecon -d hackersploit.org
dnsenum google.com
droopescan scan drupal -u target
enum4linux -a target
hydra -L users -P pass target ftp
feroxbuster -u target
fierce --domain google.com
gobuster dir -u target -w wordlist
nmap -sV --script=http-enum target
ldapsearch -x -H ldap://target -s base
mysql -u root -p -h target
nbtscan target
nmap -sn 192.168.2.0/24
nikto -h target
nmap -Pn -F -sV -O -sC target
nmap -sT -sV -A target
nmap -Pn -sA -p443,3389 target
nmap --script=mongodb-info target
nmap -oN test.txt target
hydra rdp://target
redis-cli -h target
nmap -sV -p 445 --script "smb*" target
smbclient -L //target -U user
smbmap -H target -u user -p pass
nc -nvvv target 25
snmpwalk -v 1 -c public target
hydra -L users -P pass target ssh
ffuf -u http://target/ -H "Host FUZZ.target"
sublist3r -d hackersploit.org
wafw00f hackersploit.org
whois hackersploit.org
wpscan --url target
wfuzz -c -z file,wordlist --hc 404 url/FUZZ
whatweb hackersploit.org
crackmapexec winrm target -u user -p pass
dig -t any google.com
rpcclient -U "" -N target
theHarvester -d google.com -b all