☆46Sep 28, 2017Updated 8 years ago
Alternatives and similar repositories for nmap2nessus
Users that are interested in nmap2nessus are comparing it to the libraries listed below
Sorting:
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Nessus Vulnerability visualization for the web☆31Jan 25, 2016Updated 10 years ago
- metasploitHelper☆252Apr 3, 2020Updated 5 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- My Fortify Docker Scripts☆12Mar 12, 2025Updated 11 months ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- 总结一些渗透中值得关注的默认端口☆23May 19, 2016Updated 9 years ago
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆138May 30, 2013Updated 12 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Dec 9, 2017Updated 8 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Aug 29, 2016Updated 9 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆66Mar 6, 2013Updated 12 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Enumerates users based off RDP Screenshots☆36Oct 25, 2023Updated 2 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- ☆55May 30, 2017Updated 8 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago