jeffjbowie / Nessus2Word
☆19Updated 4 years ago
Alternatives and similar repositories for Nessus2Word:
Users that are interested in Nessus2Word are comparing it to the libraries listed below
- ☆41Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- ☆38Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 4 years ago
- ☆78Updated 5 years ago
- ☆54Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- ☆20Updated 4 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆88Updated 10 months ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- Kerberoast Detection Script☆30Updated 5 months ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Windows Security Logging☆43Updated 2 years ago
- ☆10Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago