Rest API Client to automate Nessus Scanning
☆25Feb 25, 2023Updated 3 years ago
Alternatives and similar repositories for python-nessus
Users that are interested in python-nessus are comparing it to the libraries listed below
Sorting:
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- gSAST - Grep Static Analysis Security Tool☆13Mar 30, 2024Updated last year
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Security Engineer Prep for Azure☆22Nov 18, 2020Updated 5 years ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- HTTP Headers Security Cheat Sheet☆13Sep 25, 2021Updated 4 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Metasploitable3 CTF Write-up☆40Dec 12, 2017Updated 8 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- A native macOS GUI wrapper built on top of searchsploit CLI.☆15Mar 18, 2018Updated 8 years ago
- Doing the tutorial from Brandon Rhodes PyCon 2015☆16Jun 19, 2015Updated 10 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- Recon-ng is a full-featured Web Reconnaissance framework written in Python.☆38Oct 13, 2015Updated 10 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 10 months ago
- ☆14Sep 24, 2012Updated 13 years ago
- Miscellaneous scripts and tools☆15Oct 17, 2019Updated 6 years ago
- A client API for OWASP ZAP that uses Java types.☆20Mar 17, 2023Updated 3 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- Gitbook: https://mrfearless.gitbooks.io/creating-controls-in-assembler☆24Oct 3, 2023Updated 2 years ago
- A minimal Java client for the Nessus XML RPC interface☆23Apr 1, 2017Updated 8 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Apr 1, 2020Updated 5 years ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Jan 8, 2023Updated 3 years ago
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Windows Research Kernel☆14Apr 1, 2016Updated 9 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆57Apr 30, 2019Updated 6 years ago
- A script to automate the creation of a "TOR" router on Debian based systems including Raspberry Pi and install the required tools to do s…☆14Jan 12, 2021Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago