LimberDuck / nessus-cheat-sheet
Nessus Cheat Sheet in HTML, PDF, PNG, ADOC
☆11Updated 3 years ago
Alternatives and similar repositories for nessus-cheat-sheet:
Users that are interested in nessus-cheat-sheet are comparing it to the libraries listed below
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆17Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- New version of the buildkit repository☆9Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Write-Ups for TryHackMe☆22Updated 3 years ago
- Nessus Audit files☆32Updated 2 years ago
- ☆15Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 4 months ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆12Updated last year
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Updated last year
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆16Updated 3 years ago
- Kali Linux extra useful packages for CTF and Pentest activities☆11Updated last week
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆14Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago