ornl-sava / nv
Nessus Vulnerability visualization for the web
☆30Updated 9 years ago
Alternatives and similar repositories for nv
Users that are interested in nv are comparing it to the libraries listed below
Sorting:
- ☆46Updated 7 years ago
- A collection of useful scripts☆24Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- ☆25Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆12Updated 7 years ago
- A simple Nessus results viewer☆49Updated 11 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Updated 5 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆55Updated 3 years ago
- splunk_pentest_app☆51Updated 9 years ago
- Detect kerberos attacks in pcap files☆29Updated 9 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- ☆61Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Automated enumeration☆30Updated 4 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago