Framework for synthetic packet generation and characterization of Nmap scans
-
Updated
Feb 11, 2023 - Jupyter Notebook
Framework for synthetic packet generation and characterization of Nmap scans
Gets vulnerabilities based on nmap XML output
A simple Python script to run a Metasploit module over the hosts in an Nmap scan
Persist nmap results in web app
Python script to parse nmap results in a fraction of time
Tools and specimens of my protocol research
Import Nmap scans to Cherrytree
OPNSense's Suricata IDS/IPS Detection Rules Against NMAP Scans
Nmap Web Interface including XML parsing, maps and reports
Lightweight, a simple yet, Presence Detection Tool written in Rust, based on nmap, built for UNIX, made with <3
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, etc.
Add a description, image, and links to the nmap-results-analyse topic page so that developers can more easily learn about it.
To associate your repository with the nmap-results-analyse topic, visit your repo's landing page and select "manage topics."