mrschyte / nmap-converterLinks
Python script for converting nmap reports into XLS
☆344Updated 3 years ago
Alternatives and similar repositories for nmap-converter
Users that are interested in nmap-converter are comparing it to the libraries listed below
Sorting:
- Converts Nmap XML output to csv file, and other useful functions☆218Updated last year
- A simple python script to convert Nmap output to CSV☆401Updated last year
- DNS-Shell is an interactive Shell over DNS channel☆528Updated 4 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆418Updated 2 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆751Updated 9 years ago
- The great CrackMapExec tool compiled for Windows☆263Updated 9 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆322Updated 4 years ago
- Kerberos Exploitation Kit☆152Updated 10 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Updated 6 years ago
- Collection of commands, tips and tricks and references I found useful during preparation for OSCP exam.☆437Updated 3 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆529Updated last year
- Use powershell to list the RDP Connections History of logged-in users or all users☆264Updated 4 years ago
- Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.☆99Updated 10 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆432Updated last year
- ☆473Updated 2 years ago
- A super small jsp webshell with file upload capabilities.☆307Updated 4 years ago
- Easy files and payloads delivery over DNS☆422Updated last year
- ntlm relay attack to Exchange Web Services☆334Updated 7 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆433Updated 5 years ago
- SHELLING - a comprehensive OS command injection payload generator☆444Updated 5 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Updated 3 years ago
- ☆298Updated 4 years ago
- ☆259Updated 8 years ago
- A proof of concept for the RDP Inception Attack☆350Updated 8 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆511Updated 3 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆818Updated 7 years ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆276Updated 3 years ago
- A WebSocket C2 Tool☆407Updated 7 years ago
- Pip install exploit package☆157Updated 6 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆315Updated 6 years ago