TerminalFi / NessusParser-Excel
NessusV2 File Parser
☆65Updated 2 years ago
Alternatives and similar repositories for NessusParser-Excel:
Users that are interested in NessusParser-Excel are comparing it to the libraries listed below
- Parse .nessus file(s) and shows output in interactive UI☆150Updated last week
- ☆150Updated last year
- Nessus Parser☆56Updated 7 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated 9 months ago
- Active Directory Lab for Penetration Testing☆51Updated 4 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆84Updated 5 months ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- Resolves an IP address to the cloud provider it is hosted on☆95Updated this week
- ☆21Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 8 months ago
- Fly into Gophish with One Click (Infra Automation)☆48Updated 2 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Import Nmap scans to Cherrytree☆37Updated 2 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆193Updated 10 months ago
- Protocol agnostic online password guessing API.☆80Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 2 years ago
- Microsoft External Attack Tool☆179Updated 2 years ago
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- Passive internal reconnaissance tool☆70Updated 2 years ago
- ☆79Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- pentest-standard.org docs redesign☆46Updated 3 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- ☆117Updated 3 years ago