LimberDuck / nessus-file-analyzerLinks
GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadsheet file for effortless analysis.
☆106Updated 2 weeks ago
Alternatives and similar repositories for nessus-file-analyzer
Users that are interested in nessus-file-analyzer are comparing it to the libraries listed below
Sorting:
- NessusV2 File Parser☆66Updated 3 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆140Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆159Updated 6 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 6 months ago
- ☆47Updated last week
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- CLI tool and python module which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc.☆46Updated last month
- Let's obscure some IPv4 addresses☆37Updated 2 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- Collection of useful Canary tools☆92Updated last week
- ☆14Updated 9 months ago
- ☆29Updated 4 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 7 months ago
- SANS Slingshot Linux Distribution☆54Updated 4 years ago
- Helps with finding and registering categorized domains☆70Updated 4 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 6 months ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆69Updated 2 weeks ago
- Resolves an IP address to the cloud provider it is hosted on☆97Updated last week
- ☆72Updated 2 years ago
- ☆21Updated 6 years ago
- ☆80Updated 5 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 6 years ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- A tool for auditing network shares in an Active Directory environment☆43Updated 6 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago