Merges multiple .nessus files into one file.
☆46Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for NessusReportMerger
Users that are interested in NessusReportMerger are comparing it to the libraries listed below
Sorting:
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆163Jan 5, 2026Updated 2 months ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Find Inbound Email Domains☆35Dec 21, 2023Updated 2 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Aug 10, 2022Updated 3 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- Building a Windows 2016 Domain Controller using Ansible + Terrraform on AWS☆13Oct 17, 2019Updated 6 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆40Jun 3, 2021Updated 4 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Jul 19, 2018Updated 7 years ago
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 8 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆168Jan 15, 2019Updated 7 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- NessusV2 File Parser☆69Jul 12, 2022Updated 3 years ago
- extracts urls from text☆16Jul 13, 2018Updated 7 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- Maltego transform for visualizing Nessus scan data☆45Dec 11, 2019Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127May 30, 2018Updated 7 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- ☆18Nov 6, 2016Updated 9 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- A series of GPO templates☆21Jan 2, 2017Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.☆24Oct 30, 2020Updated 5 years ago
- ☆46Sep 28, 2017Updated 8 years ago