Parse .nessus file(s) and shows output in interactive UI
☆163Jan 5, 2026Updated last month
Alternatives and similar repositories for Nessus_Map
Users that are interested in Nessus_Map are comparing it to the libraries listed below
Sorting:
- GUI tool which enables you to parse nessus scan files from Tenable Nessus and Tenable Security Center, and exports results to a spreadshe…☆110Jan 23, 2026Updated last month
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- NessusV2 File Parser☆69Jul 12, 2022Updated 3 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆168Jan 15, 2019Updated 7 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104May 4, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- Merges multiple .nessus files into one file.☆46Feb 8, 2023Updated 3 years ago
- Burp Commander written in Go☆56Feb 11, 2019Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Various scripts and codes☆84Apr 23, 2021Updated 4 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Risu is Nessus parser, that converts the generated reports into a ActiveRecord database, this allows for easy report generation and vulne…☆63Nov 24, 2025Updated 3 months ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated 2 weeks ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- A tool to generate media files with malicious metadata☆129Feb 2, 2019Updated 7 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- CVE-2019-2890 WebLogic 反序列化RCE漏洞☆44Dec 8, 2019Updated 6 years ago
- JWT Attack to change the algorithm RS256 to HS256☆34May 8, 2023Updated 2 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- 泛微ecology OA系统接口存在数据库配置信息泄露漏洞☆50Jul 13, 2020Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago