Converts Nmap XML output to csv file, and other useful functions
☆94Jun 8, 2023Updated 2 years ago
Alternatives and similar repositories for Nmap-XML-to-CSV
Users that are interested in Nmap-XML-to-CSV are comparing it to the libraries listed below
Sorting:
- Converts Nmap XML output to csv file, and other useful functions☆219Jun 7, 2024Updated last year
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated 10 months ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- ☆15May 17, 2018Updated 7 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Mar 2, 2019Updated 6 years ago
- Rainbow table generation & lookup tools.☆31Dec 17, 2025Updated 2 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- OSCP Exam Report Template in Markdown☆34Oct 25, 2021Updated 4 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- ☆21Apr 16, 2023Updated 2 years ago
- AV Evasion, a Red Team Tool - Fiber, APC, PNG and UUID☆21Sep 7, 2021Updated 4 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- ☆21Apr 24, 2023Updated 2 years ago
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Jan 21, 2021Updated 5 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆25Apr 19, 2022Updated 3 years ago
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆56Jun 14, 2023Updated 2 years ago
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- This reconissance tool is specific written for OSCP engagements.☆55May 22, 2023Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Feb 12, 2020Updated 6 years ago
- General Content☆25Dec 23, 2025Updated 2 months ago
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆25Sep 16, 2018Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆49Jul 8, 2025Updated 7 months ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Feb 29, 2020Updated 6 years ago
- Python version of OWASP's DirBuster Application.☆29Dec 18, 2014Updated 11 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- Cross Site Scripting Payloads -- Variations☆72Apr 26, 2025Updated 10 months ago
- Review of AWAE.OSWE☆31Mar 12, 2022Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- Run Responder locally on a Raspberry Pi Zero.☆32May 8, 2023Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- Command line nmap XML parser☆31Feb 3, 2024Updated 2 years ago