mrschyte / nmap-converterLinks
Python script for converting nmap reports into XLS
☆345Updated 3 years ago
Alternatives and similar repositories for nmap-converter
Users that are interested in nmap-converter are comparing it to the libraries listed below
Sorting:
- A simple python script to convert Nmap output to CSV☆397Updated 2 years ago
- Converts Nmap XML output to csv file, and other useful functions☆217Updated last year
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 5 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆752Updated 9 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆325Updated 4 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Updated 6 years ago
- The great CrackMapExec tool compiled for Windows☆263Updated 9 years ago
- Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.☆99Updated 10 years ago
- ☆474Updated 2 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆418Updated 2 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆816Updated 7 years ago
- SHELLING - a comprehensive OS command injection payload generator☆444Updated 5 years ago
- Collection of commands, tips and tricks and references I found useful during preparation for OSCP exam.☆437Updated 4 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆530Updated last year
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Updated 4 years ago
- Easy files and payloads delivery over DNS☆424Updated last year
- ntlm relay attack to Exchange Web Services☆334Updated 7 years ago
- Use powershell to list the RDP Connections History of logged-in users or all users☆265Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆590Updated 4 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆517Updated 3 years ago
- Add headers to all Burp requests to bypass some WAF products☆329Updated 7 years ago
- Search Exploitable Software on Linux☆232Updated 2 years ago
- WSDL Parser extension for Burp☆261Updated 7 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆437Updated last year
- ☆259Updated 8 years ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆275Updated 3 years ago
- Kerberos Exploitation Kit☆155Updated 10 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆433Updated 6 years ago
- A super small jsp webshell with file upload capabilities.☆309Updated 4 years ago
- Create a TCP circuit through validly formed HTTP requests☆351Updated 8 years ago