aress31 / pentest2xlsxLinks
Excel parser for various pentesting tools.
☆31Updated 2 years ago
Alternatives and similar repositories for pentest2xlsx
Users that are interested in pentest2xlsx are comparing it to the libraries listed below
Sorting:
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆42Updated 4 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Automatically run and save ffuf scans for multiple IPs☆79Updated last year
- Bulk hostname lookup using shodan☆15Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- This script is a multi-threaded Okta password sprayer.☆72Updated last year
- Various scripts and codes☆84Updated 4 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Updated 4 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Fast website scraper and wordlist generator☆81Updated 2 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 3 months ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆31Updated 2 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated 11 months ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- m0chan.github.io☆85Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆56Updated 4 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- ☆24Updated 6 years ago