vdjagilev / nmap2mdLinks
A little utility to convert nmap xml results to markdown tables
☆72Updated 3 years ago
Alternatives and similar repositories for nmap2md
Users that are interested in nmap2md are comparing it to the libraries listed below
Sorting:
- Modular Enumeration and Password Spraying Framework☆121Updated last year
- OSCP Cheatsheets☆98Updated 5 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆200Updated 2 months ago
- PEN-300/OSEP Public resources for PEN-300 Training☆106Updated 3 years ago
- BloodHound Docker Ready to Use☆89Updated 2 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆167Updated 3 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- Password list generator for password spraying - prebaked with goodies☆104Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- ☆190Updated 2 years ago
- ☆117Updated 4 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- ☆66Updated 3 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆29Updated 6 years ago
- Powershell script to extract information from boot PXE☆145Updated 6 years ago
- ☆79Updated 5 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- Inject remote template link into word document for remote template injection☆179Updated 4 years ago
- ☆82Updated 5 years ago
- ☆36Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆89Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- ☆48Updated 3 years ago