LimberDuck / nessus-cheat-sheetLinks
Nessus Cheat Sheet in HTML, PDF, PNG, ADOC
☆11Updated 3 years ago
Alternatives and similar repositories for nessus-cheat-sheet
Users that are interested in nessus-cheat-sheet are comparing it to the libraries listed below
Sorting:
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆28Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 8 months ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- Domain Enrichment Toolkit $ pip install richkit☆11Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 7 months ago
- CLI tool and python module which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc.☆43Updated 3 weeks ago
- A tool for simplifying the process of researching IOCs.☆25Updated 3 years ago
- An nmap script to produce target lists for use with various tools.☆34Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Kali Linux extra useful packages for CTF and Pentest activities☆11Updated 3 weeks ago
- A Content Discovery and Development Platform. Empowering Cybersecurity, AI, Marketing, and Finance professionals and researchers to disco…☆47Updated last week
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Security tools report parsers for Faradaysec.com☆54Updated 3 weeks ago