nmapAutomator: A script you can run in the background! Useful for running during your enum exercise. I used it during my OSCP certification!
mapCIDR: it is developed to ease load distribution for mass scanning operations, it can be used both as a library and as independent CLI tool.
RustScan: The Modern Port Scanner. Find ports quickly (3 seconds at its fastest). Run scripts through our scripting engine (Python, Lua, Shell supported).
dscan: Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.
nullinux: Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB. If no username and password are provided in the command line arguments, an anonymous login, or null session, is attempted. Nullinux acts as a wrapper around the Samba tools smbclient & rpcclient to enumerate hosts using a variety of techniques.
ridenum: A simple open source method for performing null session brute forces.
SharpEDRChecker: Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV's, EDR's and logging tools.
finger-user-enum: finger-user-enum (Solaris OS) is a tool for enumerating OS-level user accounts via the finger service. As of release v1.0 it is known to work against the default Solaris daemon. It may not yet work against all daemons since there is no defined format for the data returned by the finger service.
$./finger-user-enum.pl-Uusers.txt-t10.0.0.1Startingfinger-user-enumv1.0 ( http://pentestmonkey.net/tools/finger-user-enum ) ----------------------------------------------------------|ScanInformation|----------------------------------------------------------WorkerProcesses.........5Usernamesfile...........users.txtTargetcount.............1Usernamecount...........47TargetTCPport..........79Querytimeout............5secsRelayServer.............Notused######## Scan started at Sun Jan 21 19:44:22 2007 #########root@10.0.0.1:rootSuper-Userconsole2:03Wed07:23..bin@10.0.0.1:bin???pts/1<Dec2113:04>10.0.0.99daemon@10.0.0.1:daemon???<....>..adm@10.0.0.1:admAdmin<....>..lp@10.0.0.1:lpLinePrinterAdmin<....>..uucp@10.0.0.1:uucpAdmin<....>..nobody@10.0.0.1:nobody4SunOS4.xNobody<....>..ftp@10.0.0.1:ftpAnonymousFTPUser674<Aug1114:22>10.0.0.99######## Scan completed at Sun Jan 21 19:44:23 2007 #########8results.47queriesin1seconds (47.0 queries/sec)