Excel parser for various pentesting tools.
☆31Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for pentest2xlsx
Users that are interested in pentest2xlsx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Burp Suite plugin that dynamically generates Google 2FA codes for use in session handling rules (approved by PortSwigger for inclusion in…☆29Sep 4, 2025Updated 8 months ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆23Jul 31, 2022Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 9 months ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- NessusV2 File Parser☆70Apr 21, 2026Updated 2 weeks ago
- This repository is for the Testing ASP.NET ViewState with YSoNet (YSoSerial.NET) workshop.☆24Dec 17, 2025Updated 4 months ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Apr 1, 2026Updated last month
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆17Aug 31, 2023Updated 2 years ago
- Template para proyectos de Pentesting y registrar el contenido en un Vault de Obsidian☆13Aug 5, 2021Updated 4 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 8 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆14Jun 30, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- parse nmap files☆160Jun 4, 2025Updated 11 months ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- Nessus Parser☆59Oct 27, 2017Updated 8 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 months ago
- Code for the solutions of practical reverse engineering☆23Jan 17, 2020Updated 6 years ago
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- Metasploit automation. Why work when a minion can do it?☆21May 9, 2017Updated 8 years ago
- An analytical framework for network traffic and behavioral analytics☆22Feb 23, 2023Updated 3 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- We all know about the famous spyse.com this python3 scripts scrounges subdomains without the api from spyse cybersecurity search engine☆11May 13, 2020Updated 5 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 7 months ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 8 years ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- An Android RAT that collects various sensitive information in real-time and send them to the attacker databse.☆45Nov 22, 2019Updated 6 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- Secure URL-friendly unique string ID generator in <8 LOC☆14Apr 30, 2026Updated last week
- ☆17Jul 26, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Apr 12, 2026Updated 3 weeks ago
- Learning assembly for linux-x86_64☆13Mar 18, 2016Updated 10 years ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆53Aug 18, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- nixpkgs aiming for exploiting tools, which may include non-official package or difficult to push to mainstream.☆13Jul 25, 2022Updated 3 years ago
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- Generic Makefile Template with Automatic Dependency Generation☆13Aug 6, 2021Updated 4 years ago