roeyk / nessus-report
Automatically parse and tabulate Nessus findings into OpenDocument tables
☆12Updated 9 years ago
Alternatives and similar repositories for nessus-report
Users that are interested in nessus-report are comparing it to the libraries listed below
Sorting:
- Easy 802.1Q VLAN Hopping☆80Updated 9 months ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- 504 VSAgent☆23Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆89Updated last month
- Dradis API Python Wrapper☆14Updated last year
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆61Updated 12 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆165Updated 6 years ago
- ☆36Updated 8 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Sysmon configuration file template with default high-quality event tracing☆17Updated 4 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- ☆105Updated 5 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 11 months ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆183Updated 5 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆51Updated 9 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- ☆76Updated 6 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- ☆61Updated 7 years ago