LimberDuck / nessus-file-reader
CLI tool and python module which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc.
☆39Updated 2 months ago
Related projects: ⓘ
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆92Updated 2 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆30Updated last year
- ☆76Updated 4 years ago
- ☆30Updated 6 years ago
- This script is a multi-threaded Okta password sprayer.☆66Updated 8 months ago
- Merge multiple nMap xml files into one☆47Updated 5 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆65Updated 2 years ago
- Security Assessment Report geNerated Automatically☆40Updated 7 months ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- ☆39Updated 2 months ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Virtual Security Operations Center☆49Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆67Updated last year
- SANS Slingshot Linux Distribution☆42Updated 3 years ago
- Phishing campaign docker composition for Gophish☆36Updated this week
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆61Updated 11 months ago
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- nse script to inject jndi payloads☆45Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- NessusV2 File Parser☆63Updated 2 years ago
- ☆15Updated 5 years ago
- Parse .nessus file(s) and shows output in interactive UI☆146Updated 5 months ago
- Fly into Gophish with One Click (Infra Automation)☆42Updated last year
- pentest-standard.org docs redesign☆38Updated 2 years ago
- Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"☆50Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 6 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆32Updated 3 years ago