Merges multiple .nessus files into one file.
☆46Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for NessusReportMerger
Users that are interested in NessusReportMerger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- Building a Windows 2016 Domain Controller using Ansible + Terrraform on AWS☆13Oct 17, 2019Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- NessusV2 File Parser☆70Jul 12, 2022Updated 3 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- Parse .nessus file(s) and shows output in interactive UI☆163Jan 5, 2026Updated 3 months ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Windows PowerShell module to help in the auditing of Active Directory environments.☆50Mar 22, 2017Updated 9 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆114Mar 31, 2026Updated 2 weeks ago
- An SSH honeypot written entirely in Go.☆14Dec 4, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SMB Relay Attack Script☆146Dec 6, 2018Updated 7 years ago
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 6 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- Script to output stats around weak passwords and password re-use from an NtdsAudit (pwdump) file☆62Jun 9, 2021Updated 4 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- extracts urls from text☆16Jul 13, 2018Updated 7 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Windows Privesc Check☆19May 20, 2014Updated 11 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- A pure PowerShell/ .NET DFIR capability that dumps the Windows SRUM (System Resource Usage Monitor) database to CSVs for analysis.☆14Oct 21, 2021Updated 4 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 9 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Tool to remove all versions of Sophos AV\Endpoint Defense☆27Mar 18, 2023Updated 3 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Maltego transform for visualizing Nessus scan data☆45Dec 11, 2019Updated 6 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆415Mar 21, 2025Updated last year
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 9 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- Reporting Tips for Penetration Testers☆30Jun 9, 2021Updated 4 years ago