A simple Python script to run a Metasploit module over the hosts in an Nmap scan
-
Updated
Jan 17, 2020 - Python
A simple Python script to run a Metasploit module over the hosts in an Nmap scan
Python script to parse nmap results in a fraction of time
Framework for synthetic packet generation and characterization of Nmap scans
Gets vulnerabilities based on nmap XML output
Persist nmap results in web app
Tools and specimens of my protocol research
Lightweight, a simple yet, Presence Detection Tool written in Rust, based on nmap, built for UNIX, made with <3
OPNSense's Suricata IDS/IPS Detection Rules Against NMAP Scans
Nmap Web Interface including XML parsing, maps and reports
Import Nmap scans to Cherrytree
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, etc.
Add a description, image, and links to the nmap-results-analyse topic page so that developers can more easily learn about it.
To associate your repository with the nmap-results-analyse topic, visit your repo's landing page and select "manage topics."