Adastra-thw / pynessus-restLinks
Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!
☆14Updated 10 years ago
Alternatives and similar repositories for pynessus-rest
Users that are interested in pynessus-rest are comparing it to the libraries listed below
Sorting:
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Updated 11 years ago
- Useful pentesting scripts☆83Updated 7 months ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 5 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 11 years ago
- OSCP Scripts☆14Updated 9 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Updated 5 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Updated 6 years ago
- My collection of nmap nse modules☆64Updated 5 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- This is my path to OSCP☆11Updated 7 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆96Updated 2 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated 11 months ago
- scripts for pentesting☆89Updated 7 years ago
- Linux pentest tools☆88Updated 5 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 10 years ago
- a collection of useful scripts that for penetration testers☆35Updated 3 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆137Updated 12 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- XSSing Your Way to Shell☆32Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- Tools that are related to pentest and network security☆97Updated 4 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆86Updated 11 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 10 years ago
- Windows Offline Common Password Hash Checker☆29Updated 9 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 8 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago