ajread4 / nessus_crosswalkLinks
Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.
☆12Updated 2 years ago
Alternatives and similar repositories for nessus_crosswalk
Users that are interested in nessus_crosswalk are comparing it to the libraries listed below
Sorting:
- ☆86Updated 3 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Updated last week
- Azure AD enumeration over MS Graph☆82Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- ☆42Updated 3 years ago
- Default Detections for EDR☆97Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Updated 2 weeks ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- InfoSec Notes☆60Updated last year
- ☆105Updated 3 years ago
- https://lolad-project.github.io/☆84Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 5 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Updated 3 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆73Updated last year
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- create a "simulated internet" cyber range environment☆19Updated 8 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Updated 2 years ago