joswr1ght / nmapsilent
Convert Nmap output for integration with other Project Discovery tools
☆15Updated 2 years ago
Alternatives and similar repositories for nmapsilent:
Users that are interested in nmapsilent are comparing it to the libraries listed below
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- A user enumeration tool for Slack.☆28Updated 10 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 7 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆25Updated last week
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆21Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated last month
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- ☆16Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 4 years ago
- AutoPoC Generator HoneyPoC☆35Updated last week
- self-hosted Azure OSINT tool☆30Updated 8 months ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated last year
- Continuous kerberoast monitor☆45Updated last year
- ☆18Updated last year
- ☆32Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Ansible role that Installs Mythic☆15Updated 10 months ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- ☆14Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago