Various XSL templates to manipulate data from NMap XML reports
☆27Dec 21, 2018Updated 7 years ago
Alternatives and similar repositories for nmap-xsl
Users that are interested in nmap-xsl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application Security Awareness Training☆23Jul 13, 2020Updated 5 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- OWASP Ukraine 2019 CTF☆12Feb 10, 2023Updated 3 years ago
- API Security DAST & Oprations☆17Aug 10, 2023Updated 2 years ago
- ☆16Jun 21, 2024Updated last year
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- ☆14Apr 6, 2025Updated 11 months ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- Як не стати кібер-жертвою☆256Dec 26, 2025Updated 2 months ago
- Ruby ALPC Fuzzer ( joke )☆24Oct 12, 2014Updated 11 years ago
- A mailinator-like service providing self-hosted disposable email addresses☆23Sep 15, 2014Updated 11 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Aug 6, 2019Updated 6 years ago
- Use Axiom relations with an RDBMS☆15Jan 24, 2014Updated 12 years ago
- Relational algebra SQL generator☆33Jan 24, 2014Updated 12 years ago
- My Gitbook CyberSec Notes☆20Oct 22, 2025Updated 5 months ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 10 months ago
- The commands and scripts I used in the Live Recon Village talks☆37Mar 14, 2021Updated 5 years ago
- OSCP Cheatsheet☆16Jun 14, 2023Updated 2 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Set up your own BurpSuite☆37Oct 29, 2018Updated 7 years ago
- Анонси, програми та архів матеріалів українських конференцій з кібер-безпеки.☆42Oct 2, 2021Updated 4 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- networkx graphs to ascii☆11Feb 8, 2026Updated last month
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- iis6 exploit 2017 CVE-2017-7269☆92Feb 4, 2023Updated 3 years ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Mar 17, 2026Updated last week
- ☆12May 9, 2017Updated 8 years ago
- A Faktory Worker library for Crystal☆46May 8, 2021Updated 4 years ago
- ☆47Mar 13, 2025Updated last year
- An Implementation of LoRa for EmComm (Emergency Communication) or (TacComm) Tactical Communication☆19Jul 23, 2025Updated 8 months ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- A pyhon script to do port scan via weblogic uuid☆10Oct 1, 2020Updated 5 years ago
- OWASP based Web Application Security Testing Checklist☆84Jul 19, 2024Updated last year
- A Ruby VM implemented in JavaScript☆33Aug 1, 2011Updated 14 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Python script for automating the download of nessus reports☆27Aug 3, 2022Updated 3 years ago