modernistik / Nmap-Parser
Parse nmap scan data with Perl (official repo)
☆36Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Nmap-Parser
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated last month
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆31Updated last month
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Collect hashes password hashes for cracking☆30Updated 11 years ago
- ☆12Updated 5 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 2 months ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 7 years ago
- ☆24Updated 4 years ago
- Scripts to query local admins quickly☆9Updated 8 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 6 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- A curated list of tools for incident response☆27Updated 8 months ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Automated install process for Phishing Frenzy☆23Updated 9 years ago