Assists in mass exportation of Nessus scans
☆19Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for nessporter
Users that are interested in nessporter are comparing it to the libraries listed below
Sorting:
- Quickly manage DNS records for domains owned within GoDaddy, Namecheap and Route53☆11Jul 19, 2021Updated 4 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- cpufuzz is a dumb, simple and portable CPU fuzzer☆11Jan 27, 2019Updated 7 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- Packet Batch's old DPDK program. An application that utilizes the DPDK to send network packets. Used for penetration testing including De …☆16Apr 20, 2024Updated last year
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- something i needed once☆20Mar 12, 2011Updated 14 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 4 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Jul 4, 2020Updated 5 years ago
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 3 months ago
- ☆22May 29, 2020Updated 5 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- Check for .net padding oracle patch☆19Oct 4, 2018Updated 7 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆24Oct 1, 2023Updated 2 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆23Jul 15, 2021Updated 4 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Script to output stats around weak passwords and password re-use from an NtdsAudit (pwdump) file☆62Jun 9, 2021Updated 4 years ago
- ☆65Jan 17, 2026Updated last month
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 8 months ago