☆19Mar 23, 2021Updated 4 years ago
Alternatives and similar repositories for Nessus2Word
Users that are interested in Nessus2Word are comparing it to the libraries listed below
Sorting:
- ☆11May 30, 2021Updated 4 years ago
- ☆11Feb 14, 2025Updated last year
- Want to execute command repeatedly without workache? Here is shloop born for it!☆11Mar 2, 2022Updated 4 years ago
- jackson-databind-exploit☆13Mar 22, 2019Updated 6 years ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆64Feb 5, 2026Updated last month
- ☆13Feb 14, 2020Updated 6 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- ☆16Dec 2, 2019Updated 6 years ago
- A Powerful Email Harvester Tool By OCEAN OF ANYTHING☆17Nov 20, 2025Updated 3 months ago
- ☆20May 22, 2018Updated 7 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 6 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Nov 24, 2021Updated 4 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Python library for threat intelligence☆93Jan 14, 2025Updated last year
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆93Mar 22, 2025Updated 11 months ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Sep 4, 2021Updated 4 years ago
- curl based tool to send messages using Microsoft Exchange ActiveSync protocol☆11Oct 18, 2019Updated 6 years ago
- ☆11Oct 10, 2020Updated 5 years ago
- Repository for IT Audit and Controls Course (IS 369)☆15Feb 23, 2022Updated 4 years ago
- How to install macOS Big Sur on an Unsupported Mac : Example: MacBook Pro Late 2011☆10Feb 27, 2021Updated 5 years ago
- ☆15Sep 4, 2024Updated last year
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A pytorch image classifier for the recognising letters from the notMNIST dataset☆11Jan 4, 2019Updated 7 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- A Sample App to Demonstrate React Native and FastAPI Integration☆14Jan 26, 2023Updated 3 years ago