redteamsecurity / AutoNessus
This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, you can list all scans, list all policies, start, stop, pause, and resume a scan.
☆215Updated 5 years ago
Alternatives and similar repositories for AutoNessus:
Users that are interested in AutoNessus are comparing it to the libraries listed below
- Kvasir: Penetration Test Data Management☆427Updated 6 years ago
- Next Generation Firewall Audit and Bypass Tool☆263Updated 7 years ago
- Honeypot deployment made easy☆235Updated 5 years ago
- Automated digital reconnaissance☆196Updated 2 years ago
- Automated Responder/secretsdump.py cracking☆182Updated 8 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- SpiderLabs shared Nmap Tools☆228Updated 4 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆146Updated 8 years ago
- Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!☆231Updated 4 years ago
- A repository for large scripts from my book.☆161Updated 3 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆253Updated 9 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆380Updated 4 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- Auto Domain Admin and Network Exploitation.☆298Updated 7 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 8 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- ☆140Updated 9 months ago
- ☆280Updated 4 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- Snarf man-in-the-middle / relay suite☆203Updated 8 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆157Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- Recon, Subdomain Bruting, Zone Transfers☆228Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago