redteamsecurity / AutoNessusLinks
This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, you can list all scans, list all policies, start, stop, pause, and resume a scan.
☆214Updated 5 years ago
Alternatives and similar repositories for AutoNessus
Users that are interested in AutoNessus are comparing it to the libraries listed below
Sorting:
- Kvasir: Penetration Test Data Management☆429Updated 6 years ago
- Automated digital reconnaissance☆197Updated 2 years ago
- Honeypot deployment made easy☆236Updated 6 years ago
- Next Generation Firewall Audit and Bypass Tool☆264Updated 8 years ago
- Shodan HQ nmap plugin - passively scan targets☆155Updated 9 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆185Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆299Updated 7 years ago
- SpiderLabs shared Nmap Tools☆229Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆254Updated 9 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- A repository for large scripts from my book.☆161Updated 3 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147Updated 9 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆385Updated 2 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Updated 8 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 8 years ago
- Web Sight Docker Deployment☆123Updated 7 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆158Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 8 years ago
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆355Updated 2 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 6 years ago