jeffjbowie / Nessus2Word
☆19Updated 4 years ago
Alternatives and similar repositories for Nessus2Word
Users that are interested in Nessus2Word are comparing it to the libraries listed below
Sorting:
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- ☆42Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- Scripts and One-Liners☆22Updated 3 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 5 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- ☆79Updated 5 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- ☆38Updated 3 years ago
- A PowerShell script for performing a build review of a Windows host☆23Updated 6 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- ☆20Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Kerberoast Detection Script☆30Updated 6 months ago