Pinned Repositories
check-smb-signing
Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of hosts that have message signing disabled, supported, and required.
cisco-config-check
Shell script to check Cisco config files, such as those downloaded with Smart Install, for sensitive information.
find-reused-ntds-hashes
Shell script to check a file containing NTLM hashes for repeated hashes.
ike-trans
A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive Modes. For Aggresive Mode, a custom group ID can be given. Targets can be specified as a single IP, or an input file of multiple IPs.
msf-exploit-loop
Metasploit resource script to read a list of desired RHOST values and run the current exploit module for each.
nmap-grep
Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.
nmaparse
Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a summary table.
nse-parse
Shell script for parsing vulnerable results from Nmap NSE scan output.
sslscanalyzer
Shell script for converting an input file containing one or more sslscan results into HTML tables.
xsltsslscan
XSLT for SSLScan 2.0 XML results
actuated's Repositories
actuated/user-parse
Shell scripts for username parsing. Convert information gathering results into possible usernames, extract results from common user enumeration tools, and modify a list of base usernames by prepending, inserting, or appending a fixed string, or a generated range of letters or numbers.