LimberDuck / nessus-cheat-sheetLinks
Nessus Cheat Sheet in HTML, PDF, PNG, ADOC
☆11Updated 3 years ago
Alternatives and similar repositories for nessus-cheat-sheet
Users that are interested in nessus-cheat-sheet are comparing it to the libraries listed below
Sorting:
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆15Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 5 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆16Updated 7 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆12Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Updated last year
- Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA v…☆27Updated last month
- ☆22Updated 8 months ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆28Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- ☆16Updated 3 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated 7 months ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆30Updated last year
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- ☆19Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last month
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆34Updated 8 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- ☆35Updated 2 years ago
- ☆34Updated 2 years ago