redteamsecurity / AutoNessus
This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, you can list all scans, list all policies, start, stop, pause, and resume a scan.
☆215Updated 5 years ago
Alternatives and similar repositories for AutoNessus:
Users that are interested in AutoNessus are comparing it to the libraries listed below
- Honeypot deployment made easy☆235Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆503Updated 4 years ago
- Automated digital reconnaissance☆196Updated 2 years ago
- Next Generation Firewall Audit and Bypass Tool☆264Updated 7 years ago
- Kvasir: Penetration Test Data Management☆427Updated 6 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆146Updated 8 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- Vulnerability Data in ES☆145Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆182Updated 8 years ago
- SpiderLabs shared Nmap Tools☆228Updated 4 years ago
- Auto Domain Admin and Network Exploitation.☆298Updated 7 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆381Updated 5 years ago
- Recon, Subdomain Bruting, Zone Transfers☆228Updated 8 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆253Updated 9 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- Shodan HQ nmap plugin - passively scan targets☆153Updated 9 years ago
- ☆140Updated 10 months ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆135Updated 11 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆380Updated 2 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- ☆425Updated 7 years ago
- A repository for large scripts from my book.☆161Updated 3 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!☆231Updated 4 years ago
- The Seeker of IOC☆129Updated 4 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆165Updated 6 years ago