Converts Nmap XML output to csv file, and other useful functions
☆94Jun 8, 2023Updated 2 years ago
Alternatives and similar repositories for Nmap-XML-to-CSV
Users that are interested in Nmap-XML-to-CSV are comparing it to the libraries listed below
Sorting:
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Dec 5, 2018Updated 7 years ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆54Aug 18, 2023Updated 2 years ago
- 5ELG is a browser fingerprinting tool designed to collect and analyze data about a user's browser and environment through various module…☆22Feb 3, 2025Updated last year
- OSCP Exam Report Template in Markdown☆34Oct 25, 2021Updated 4 years ago
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- FTDI bricker just for fun - malware POC+hardware hacking CTF☆18Sep 23, 2024Updated last year
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- ☆21Apr 16, 2023Updated 2 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- ☆15May 17, 2018Updated 7 years ago
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Jan 21, 2021Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- ☆18Jan 14, 2026Updated 2 months ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- ☆21Apr 24, 2023Updated 2 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆32May 1, 2021Updated 4 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- CyberChef update scripts in PowerShell & Bash☆18Apr 22, 2024Updated last year
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆32Mar 2, 2019Updated 7 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- Fast mass dns resolver☆20Jul 23, 2018Updated 7 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- ☆13Jan 20, 2020Updated 6 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 2 months ago
- AV Evasion, a Red Team Tool - Fiber, APC, PNG and UUID☆21Sep 7, 2021Updated 4 years ago
- ☆13Feb 25, 2026Updated 3 weeks ago
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆73Sep 24, 2020Updated 5 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- ☆14Sep 28, 2023Updated 2 years ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- ☆12Sep 10, 2022Updated 3 years ago