☆46Sep 28, 2017Updated 8 years ago
Alternatives and similar repositories for nmap2nessus
Users that are interested in nmap2nessus are comparing it to the libraries listed below
Sorting:
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- metasploitHelper☆253Apr 3, 2020Updated 5 years ago
- Nessus Vulnerability visualization for the web☆31Jan 25, 2016Updated 10 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- My Fortify Docker Scripts☆12Mar 12, 2025Updated last year
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆138May 30, 2013Updated 12 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- ☆55May 30, 2017Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- 总结一些渗透中值得关注的默认端口☆23May 19, 2016Updated 9 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆66Mar 6, 2013Updated 13 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Dec 9, 2017Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Feb 12, 2020Updated 6 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Aug 29, 2016Updated 9 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- Powershell Persistence Locator☆67Sep 11, 2016Updated 9 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆168Jan 15, 2019Updated 7 years ago